CVE-2017-17712 log
Source |
|
Severity | High |
Remote | No |
Type | Privilege escalation |
Description | A flaw was found in the Linux kernel's implementation of raw_sendmsg before 4.14.11, 4.4.109 and 4.9.74 allowing a local attacker to panic the kernel or possibly leak kernel addresses. A local attacker, with the privilege of creating raw sockets, can abuse a possible race condition when setting the socket option to allow the kernel to automatically create ip header values and thus potentially escalate their privileges. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-574 | linux-hardened | 4.14.7.a-1 | 4.14.11.a-1 | High | Fixed | FS#56832 |
AVG-571 | linux-zen | 4.14.7-1 | 4.14.11-1 | High | Fixed | FS#56832 |
AVG-561 | linux-lts | 4.9.68-1 | 4.9.74-1 | High | Fixed | |
AVG-552 | linux | 4.14.7-1 | 4.14.11-1 | High | Fixed | FS#56832 |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
05 Jan 2018 | ASA-201801-4 | AVG-574 | linux-hardened | High | multiple issues |
05 Jan 2018 | ASA-201801-3 | AVG-571 | linux-zen | High | multiple issues |
05 Jan 2018 | ASA-201801-2 | AVG-561 | linux-lts | High | multiple issues |
05 Jan 2018 | ASA-201801-1 | AVG-552 | linux | High | multiple issues |
References |
---|
https://git.kernel.org/linus/8f659a03a0ba9289b9aeb9b4470e6fb263d6f483 |