CVE-2017-1000112

Impact:
Important
Public Date:
2017-08-10
CWE:
CWE-122
Bugzilla:
1479307: CVE-2017-1000112 kernel: Exploitable memory corruption due to UFO to non-UFO path switch
An exploitable memory corruption flaw was found in the Linux kernel. The append path can be erroneously switched from UFO to non-UFO in ip_ufo_append_data() when building an UFO packet with MSG_MORE option. If unprivileged user namespaces are available, this flaw can be exploited to gain root privileges.

Find out more about CVE-2017-1000112 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue affects the Linux kernel packages as shipped with Red Hat
Enterprise Linux 5,6, 7 and MRG-2.

Future Linux kernel updates for the respective releases may address this issue.

CVSS v3 metrics

CVSS3 Base Score 7
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector Local
Attack Complexity High
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux for Real Time for NFV (v. 7) (kernel-rt) RHSA-2017:2931 2017-10-19
Red Hat Enterprise Linux 7 (kernel) RHSA-2017:2930 2017-10-19
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2017:2918 2017-10-19
Red Hat Enterprise Linux 6 (kernel) RHSA-2017:3200 2017-11-14

Affected Packages State

Platform Package State
Red Hat Enterprise MRG 2 realtime-kernel Affected
Red Hat Enterprise Linux 7 kernel-alt Affected
Red Hat Enterprise Linux 5 kernel Affected

Acknowledgements

Red Hat would like to thank Andrey Konovalov for reporting this issue.

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.