Vulnerability Description
The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.2, < 3.2.99 |
| Debian | Debian Linux | 7.0 |
| Arista | Eos | 4.20.1fx-virtual-router |
| F5 | Arx | >= 6.2.0, <= 6.4.0 |
| Suse | Caas Platform | All versions |
| Suse | Linux Enterprise Debuginfo | 11 |
| Suse | Linux Enterprise Module For Public Cloud | 12 |
| Suse | Linux Enterprise Point Of Sale | 11 |
| Suse | Openstack Cloud | 6 |
| Opensuse | Leap | 42.3 |
| Suse | Linux Enterprise Desktop | 12 |
| Suse | Linux Enterprise High Availability | 12 |
| Suse | Linux Enterprise High Availability Extension | 11 |
| Suse | Linux Enterprise Live Patching | 12 |
| Suse | Linux Enterprise Real Time Extension | 11 |
| Suse | Linux Enterprise Server | 11 |
| Suse | Linux Enterprise Software Development Kit | 11 |
| Suse | Linux Enterprise Workstation Extension | 12 |
| Openstack | Cloud Magnum Orchestration | 7 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fdPatchThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.htmlMailing ListThird Party Advisory
- http://patchwork.ozlabs.org/patch/746618/PatchThird Party Advisory
- http://www.securityfocus.com/bid/102367Broken LinkThird Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-3583-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-3583-2Third Party Advisory
FAQ
What is CVE-2017-18017?
CVE-2017-18017 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory...
How severe is CVE-2017-18017?
CVE-2017-18017 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-18017?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux, Arista Eos, F5 Arx, Suse Caas Platform.