CVE-2017-18509
Published: 13 August 2019
An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.
From the Ubuntu Security Team
It was discovered that the IPv6 implementation in the Linux kernel did not properly validate socket options in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.13.0-16.19)
|
disco |
Not vulnerable
(4.18.0-10.11)
|
|
trusty |
Ignored
(was needed ESM criteria)
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Released
(4.4.0-165.193)
|
|
Patches: Introduced by d1db275dd3f6e4182c4c4b4a1ac6287925d60569 |
||
linux-aws Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.15.0-1001.1)
|
disco |
Not vulnerable
(4.18.0-1002.3)
|
|
trusty |
Ignored
(was needed ESM criteria)
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Released
(4.4.0-1095.106)
|
|
linux-aws-hwe Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
disco |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Not vulnerable
(4.15.0-1030.31~16.04.1)
|
|
linux-azure Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.15.0-1002.2)
|
disco |
Not vulnerable
(4.18.0-1003.3)
|
|
trusty |
Not vulnerable
(4.15.0-1023.24~14.04.1)
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Not vulnerable
(4.11.0-1009.9)
|
|
linux-azure-edge Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.15.0-1002.2)
|
disco |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Not vulnerable
(4.11.0-1009.9)
|
|
linux-gcp Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.15.0-1001.1)
|
disco |
Not vulnerable
(4.18.0-1002.3)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Released
(4.13.0-1002.5)
|
|
linux-gcp-edge Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.15.0-1001.1)
|
disco |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Does not exist
|
|
linux-gke-4.15 Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.15.0-1030.32)
|
disco |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Does not exist
|
|
linux-gke-5.0 Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(5.0.0-1011.11~18.04.1)
|
disco |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Does not exist
|
|
linux-hwe Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.18.0-13.14~18.04.1)
|
disco |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Released
(4.13.0-26.29~16.04.2)
|
|
linux-hwe-edge Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(5.0.0-15.16~18.04.1)
|
disco |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Released
(4.13.0-26.29~16.04.2)
|
|
linux-kvm Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.15.0-1002.2)
|
disco |
Not vulnerable
(4.18.0-1003.3)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Released
(4.4.0-1059.66)
|
|
linux-lts-trusty Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
disco |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Does not exist
|
|
linux-lts-xenial Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
disco |
Does not exist
|
|
trusty |
Ignored
(was needed ESM criteria)
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Does not exist
|
|
linux-oem Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.15.0-1002.3)
|
disco |
Not vulnerable
(4.15.0-1021.24)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Ignored
(was needs-triage now end-of-life)
|
|
linux-oracle Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.15.0-1007.9)
|
disco |
Not vulnerable
(4.15.0-1007.9)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Not vulnerable
(4.15.0-1007.9~16.04.1)
|
|
linux-raspi2 Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.13.0-1005.5)
|
disco |
Not vulnerable
(4.18.0-1005.7)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Released
(4.4.0-1123.132)
|
|
linux-snapdragon Launchpad, Ubuntu, Debian |
bionic |
Released
(4.15.0-1053.57)
|
disco |
Not vulnerable
(5.0.0-1010.10)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.11~rc1)
|
|
xenial |
Released
(4.4.0-1127.135)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509
- https://git.kernel.org/linus/99253eb750fda6a644d5188fb26c43bad8d5a745
- https://pulsesecurity.co.nz/advisories/linux-kernel-4.9-inetcsklistenstop-gpf
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99253eb750fda6a644d5188fb26c43bad8d5a745
- https://github.com/torvalds/linux/commit/99253eb750fda6a644d5188fb26c43bad8d5a745
- https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html
- https://lists.openwall.net/netdev/2017/12/04/40
- https://salsa.debian.org/kernel-team/linux/commit/baefcdc2f29923e7325ce4e1a72c3ff0a9800f32
- https://www.debian.org/security/2019/dsa-4497
- https://ubuntu.com/security/notices/USN-4145-1
- NVD
- Launchpad
- Debian