Note:
This project will be discontinued after December 13, 2021. [more]
2017-09-15
The tpacket_rcv function in net/packet/af_packet.c in the Linux kernel before 4.13 mishandles vnet headers, which might allow local users to cause a denial of service (buffer overflow, and disk and memory corruption) or possibly have unspecified other impact via crafted system calls.
Products | Debian_linux, Linux_kernel |
Type | Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) |
First patch |
https://github.com/torvalds/linux/commit/edbd58be15a957f6a760c4a514cd475217eb97fd |
Patches | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=edbd58be15a957f6a760c4a514cd475217eb97fd |
Relevant file/s | ./net/packet/af_packet.c (modified, +9, -3) |
Links |
• http://www.securityfocus.com/bid/100871
• https://bugzilla.redhat.com/show_bug.cgi?id=1492593 • http://www.securitytracker.com/id/1040106 • http://www.securitytracker.com/id/1039371 • http://www.debian.org/security/2017/dsa-3981 |
Navigation
Patch data:
Patched area:
(on by default)
Patched area: