Vulnerability Description
The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.7, < 3.10.106 |
| Canonical | Ubuntu Linux | 14.04 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2017/dsa-3791Third Party Advisory
- http://www.openwall.com/lists/oss-security/2017/02/07/2Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/96037Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037794Third Party AdvisoryVDB Entry
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=7892032PatchThird Party Advisory
- https://source.android.com/security/bulletin/2017-09-01Third Party Advisory
- https://usn.ubuntu.com/3754-1/Third Party Advisory
- http://www.debian.org/security/2017/dsa-3791Third Party Advisory
- http://www.openwall.com/lists/oss-security/2017/02/07/2Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/96037Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037794Third Party AdvisoryVDB Entry
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=7892032PatchThird Party Advisory
- https://source.android.com/security/bulletin/2017-09-01Third Party Advisory
- https://usn.ubuntu.com/3754-1/Third Party Advisory
FAQ
What is CVE-2017-5897?
CVE-2017-5897 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds a...
How severe is CVE-2017-5897?
CVE-2017-5897 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-5897?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Canonical Ubuntu Linux, Debian Debian Linux.