Логотип exploitDog
bind:CVE-2017-18509
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-18509

Количество 10

Количество 10

ubuntu логотип

CVE-2017-18509

почти 6 лет назад

An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2017-18509

почти 6 лет назад

An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.

CVSS3: 7.2
EPSS: Низкий
nvd логотип

CVE-2017-18509

почти 6 лет назад

An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2017-18509

почти 6 лет назад

An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-32qx-4wxm-fcw8

около 3 лет назад

An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels.

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2019-4855

больше 5 лет назад

ELSA-2019-4855: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14218-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2950-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2984-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2949-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-18509

An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.

CVSS3: 7.8
0%
Низкий
почти 6 лет назад
redhat логотип
CVE-2017-18509

An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.

CVSS3: 7.2
0%
Низкий
почти 6 лет назад
nvd логотип
CVE-2017-18509

An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.

CVSS3: 7.8
0%
Низкий
почти 6 лет назад
debian логотип
CVE-2017-18509

An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before ...

CVSS3: 7.8
0%
Низкий
почти 6 лет назад
github логотип
GHSA-32qx-4wxm-fcw8

An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels.

CVSS3: 7.8
0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2019-4855

ELSA-2019-4855: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:14218-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:2950-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:2984-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:2949-1

Security update for the Linux Kernel

больше 5 лет назад

Уязвимостей на страницу