First published: Mon Feb 13 2017(Updated: )
A vulnerability was found in the Linux kernel. A remote attacker that can send packets containing malicious IP options could cause the ipv4_pktinfo_prepare() function to drop/free the dst. This could result in a system crash or possible privilege escalation if the attacker is able to place crafted objects in this dropped location. Upstream patch: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b2cef20f19c87999fff3da4071e66937db9644">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b2cef20f19c87999fff3da4071e66937db9644</a> References: <a href="http://seclists.org/oss-sec/2017/q1/414">http://seclists.org/oss-sec/2017/q1/414</a> <a href="https://patchwork.ozlabs.org/patch/724136/">https://patchwork.ozlabs.org/patch/724136/</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Linux Kernel | <=4.9.9 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5970 is a vulnerability in the Linux kernel that allows attackers to cause a denial of service by making crafted system calls or sending IPv4 traffic with invalid IP options.
CVE-2017-5970 has a severity rating of high (7 out of 10).
CVE-2017-5970 affects the Linux kernel versions up to 4.9.9.
The remedy for CVE-2017-5970 is to update the Linux kernel to version 4.10 or later.
You can find more information about CVE-2017-5970 at the following references: [Link 1](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b2cef20f19c87999fff3da4071e66937db9644), [Link 2](http://seclists.org/oss-sec/2017/q1/414), [Link 3](https://patchwork.ozlabs.org/patch/724136/).