Out-of-bounds read in Linux kernel - CVE-2017-7277
Published: March 28, 2017 / Updated: March 31, 2017
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to read data or crash the application.
The vulnerability exists due to an out-of-bounds read error within the __sock_recv_timestamp() function in net/socket.c, within the EXPORT_SYMBOL(), skb_complete_tx_timestamp() and __skb_tstamp_tx() functions in net/core/skbuff.c. A local user can read data or crash the application.
How to mitigate CVE-2017-7277
Sources
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4ef1b2869447411ad3ef91ad7d4891a83c1a509a
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8605330aac5a5785630aec8f64378a54891937cc
- http://www.securityfocus.com/bid/97141
- https://github.com/torvalds/linux/commit/4ef1b2869447411ad3ef91ad7d4891a83c1a509a
- https://github.com/torvalds/linux/commit/8605330aac5a5785630aec8f64378a54891937cc
- https://lkml.org/lkml/2017/3/15/485
- https://patchwork.ozlabs.org/patch/740636/
- https://patchwork.ozlabs.org/patch/740639/