CVE-2017-7184

CVE Details

Release Date:2017-03-29

Description


The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in theLinux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52.

See more information about CVE-2017-7184 from MITRE CVE dictionary and NIST NVD


CVSS v2.0 metrics


NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.

Base Score: 7.2 Base Metrics: AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector: Local network Attack Complexity: Low
Authentication: None required Confidentiality Impact: Complete
Integrity Impact: Complete Availability Impact: Complete

Errata information


PlatformErrataRelease Date
Oracle Linux version 5 (kernel-uek)ELSA-2017-35672017-05-16
Oracle Linux version 6 (dtrace-modules-3.8.13-118.18.2.el6uek)ELSA-2017-35662017-05-16
Oracle Linux version 6 (dtrace-modules-4.1.12-61.1.34.el6uek)ELSA-2017-35392017-04-13
Oracle Linux version 6 (kernel-uek)ELSA-2017-35392017-04-13
Oracle Linux version 6 (kernel-uek)ELSA-2017-35662017-05-16
Oracle Linux version 6 (kernel-uek)ELSA-2017-35672017-05-16
Oracle Linux version 7 (dtrace-modules-3.8.13-118.18.2.el7uek)ELSA-2017-35662017-05-16
Oracle Linux version 7 (dtrace-modules-4.1.12-61.1.34.el7uek)ELSA-2017-35392017-04-13
Oracle Linux version 7 (kernel)ELSA-2017-29302017-10-19
Oracle Linux version 7 (kernel)ELSA-2017-2930-12017-10-20
Oracle Linux version 7 (kernel-uek)ELSA-2017-35392017-04-13
Oracle Linux version 7 (kernel-uek)ELSA-2017-35662017-05-16
Oracle VM version 3.2 (kernel-uek)OVMSA-2017-01062017-05-16
Oracle VM version 3.3 (kernel-uek)OVMSA-2017-01052017-05-16
Oracle VM version 3.4 (kernel-uek)OVMSA-2017-00622017-04-13



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete