← Retour aux CVEs
CVE-2017-2671
N/ADescription
The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.
Details CVE
Score CVSS v3.1N/A
Publie4/5/2017
Derniere modification4/20/2025
Sourcenvd
Observations honeypot0
Produits affectes
linux:linux_kernel
References
http://openwall.com/lists/oss-security/2017/04/04/8(secalert@redhat.com)
http://www.securityfocus.com/bid/97407(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2017:1842(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2017:2077(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2017:2669(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:1854(secalert@redhat.com)
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893(secalert@redhat.com)
https://github.com/danieljiang0415/android_kernel_crash_poc(secalert@redhat.com)
https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893(secalert@redhat.com)
https://twitter.com/danieljiang0415/status/845116665184497664(secalert@redhat.com)
https://usn.ubuntu.com/3754-1/(secalert@redhat.com)
https://www.exploit-db.com/exploits/42135/(secalert@redhat.com)
http://openwall.com/lists/oss-security/2017/04/04/8(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/97407(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1842(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2077(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2669(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1854(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/danieljiang0415/android_kernel_crash_poc(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893(af854a3a-2127-422b-91ae-364da2661108)
https://twitter.com/danieljiang0415/status/845116665184497664(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3754-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/42135/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.