CVE-2017-2671

The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.
References
Link Resource
http://openwall.com/lists/oss-security/2017/04/04/8 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/97407 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:1842
https://access.redhat.com/errata/RHSA-2017:2077
https://access.redhat.com/errata/RHSA-2017:2669
https://access.redhat.com/errata/RHSA-2018:1854
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893 Issue Tracking Patch Third Party Advisory
https://github.com/danieljiang0415/android_kernel_crash_poc Third Party Advisory
https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893 Issue Tracking Patch Third Party Advisory
https://twitter.com/danieljiang0415/status/845116665184497664 Third Party Advisory
https://usn.ubuntu.com/3754-1/
https://www.exploit-db.com/exploits/42135/
http://openwall.com/lists/oss-security/2017/04/04/8 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/97407 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:1842
https://access.redhat.com/errata/RHSA-2017:2077
https://access.redhat.com/errata/RHSA-2017:2669
https://access.redhat.com/errata/RHSA-2018:1854
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893 Issue Tracking Patch Third Party Advisory
https://github.com/danieljiang0415/android_kernel_crash_poc Third Party Advisory
https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893 Issue Tracking Patch Third Party Advisory
https://twitter.com/danieljiang0415/status/845116665184497664 Third Party Advisory
https://usn.ubuntu.com/3754-1/
https://www.exploit-db.com/exploits/42135/
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:23

Type Values Removed Values Added
References () http://openwall.com/lists/oss-security/2017/04/04/8 - Mailing List, Third Party Advisory () http://openwall.com/lists/oss-security/2017/04/04/8 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/97407 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/97407 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:1842 - () https://access.redhat.com/errata/RHSA-2017:1842 -
References () https://access.redhat.com/errata/RHSA-2017:2077 - () https://access.redhat.com/errata/RHSA-2017:2077 -
References () https://access.redhat.com/errata/RHSA-2017:2669 - () https://access.redhat.com/errata/RHSA-2017:2669 -
References () https://access.redhat.com/errata/RHSA-2018:1854 - () https://access.redhat.com/errata/RHSA-2018:1854 -
References () https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893 - Issue Tracking, Patch, Third Party Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/danieljiang0415/android_kernel_crash_poc - Third Party Advisory () https://github.com/danieljiang0415/android_kernel_crash_poc - Third Party Advisory
References () https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893 - Issue Tracking, Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893 - Issue Tracking, Patch, Third Party Advisory
References () https://twitter.com/danieljiang0415/status/845116665184497664 - Third Party Advisory () https://twitter.com/danieljiang0415/status/845116665184497664 - Third Party Advisory
References () https://usn.ubuntu.com/3754-1/ - () https://usn.ubuntu.com/3754-1/ -
References () https://www.exploit-db.com/exploits/42135/ - () https://www.exploit-db.com/exploits/42135/ -

Information

Published : 2017-04-05 06:59

Updated : 2025-04-20 01:37


NVD link : CVE-2017-2671

Mitre link : CVE-2017-2671

CVE.ORG link : CVE-2017-2671


JSON object : View

Products Affected

linux

  • linux_kernel