Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-1000112

Опубликовано: 10 авг. 2017
Источник: redhat
CVSS3: 7
EPSS Высокий

Описание

Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.

An exploitable memory corruption flaw was found in the Linux kernel. The append path can be erroneously switched from UFO to non-UFO in ip_ufo_append_data() when building an UFO packet with MSG_MORE option. If unprivileged user namespaces are available, this flaw can be exploited to gain root privileges.

Отчет

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5,6, 7 and MRG-2. Future Linux kernel updates for the respective releases may address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7kernel-altAffected
Red Hat Enterprise Linux 5.9 Long LifekernelFixedRHSA-2019:193229.07.2019
Red Hat Enterprise Linux 5 Extended Lifecycle SupportkernelFixedRHSA-2019:193129.07.2019
Red Hat Enterprise Linux 6kernelFixedRHSA-2017:320014.11.2017
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2017:293119.10.2017
Red Hat Enterprise Linux 7kernelFixedRHSA-2017:293019.10.2017
Red Hat Enterprise Linux 7.3 Advanced Update SupportkernelFixedRHSA-2019:415910.12.2019
Red Hat Enterprise Linux 7.3 Telco Extended Update SupportkernelFixedRHSA-2019:415910.12.2019
Red Hat Enterprise Linux 7.3 Update Services for SAP SolutionskernelFixedRHSA-2019:415910.12.2019
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2017:291819.10.2017

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1479307kernel: Exploitable memory corruption due to UFO to non-UFO path switch

EPSS

Процентиль: 99%
0.84291
Высокий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
больше 7 лет назад

Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.

CVSS3: 7
nvd
больше 7 лет назад

Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.

CVSS3: 7
debian
больше 7 лет назад

Linux kernel: Exploitable memory corruption due to UFO to non-UFO path ...

suse-cvrf
почти 8 лет назад

Security update for Linux Kernel Live Patch 21 for SLE 12

suse-cvrf
почти 8 лет назад

Security update for Linux Kernel Live Patch 19 for SLE 12

EPSS

Процентиль: 99%
0.84291
Высокий

7 High

CVSS3

Уязвимость CVE-2017-1000112