First published: Tue Mar 28 2017(Updated: )
A race condition, leading to a NULL pointer dereference, was found in the Linux kernel's Link Layer Control implementation. A local attacker with access to ping sockets could use this flaw to corrupt kernel memory leading to a kernel crash or privilege escalation. References: <a href="http://seclists.org/oss-sec/2017/q1/675">http://seclists.org/oss-sec/2017/q1/675</a> CVE assignment: <a href="http://seclists.org/oss-sec/2017/q2/17">http://seclists.org/oss-sec/2017/q2/17</a> Patch: <a href="http://seclists.org/oss-sec/2017/q1/677">http://seclists.org/oss-sec/2017/q1/677</a> <a href="https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=43a6684519ab0a6c52024b5e25322476cabad893">https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=43a6684519ab0a6c52024b5e25322476cabad893</a> Upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43a6684519ab0a6c52024b5e25322476cabad893">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43a6684519ab0a6c52024b5e25322476cabad893</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.10.8 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2671 is a vulnerability in the ping_unhash function in the Linux kernel, which allows local users to cause a denial of service (panic).
CVE-2017-2671 has a severity level of medium.
CVE-2017-2671 affects Linux kernel versions up to 4.10.8.
To fix CVE-2017-2671, update your Linux kernel to version 4.11 or higher.
You can find more information about CVE-2017-2671 at the following links: [Link 1](http://seclists.org/oss-sec/2017/q1/675), [Link 2](http://seclists.org/oss-sec/2017/q2/17), [Link 3](http://seclists.org/oss-sec/2017/q1/677).