CVE-2017-18017

The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.
References
Link Resource
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.36 Release Notes Vendor Advisory
https://lkml.org/lkml/2017/4/2/13 Third Party Advisory
https://github.com/torvalds/linux/commit/2638fd0f92d4397884fd991d8f4925cb3f081901 Patch Third Party Advisory
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1739765 Issue Tracking Third Party Advisory
http://patchwork.ozlabs.org/patch/746618/ Patch Third Party Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901 Patch Third Party Advisory
http://www.securityfocus.com/bid/102367 Third Party Advisory VDB Entry
https://usn.ubuntu.com/3583-2/
https://usn.ubuntu.com/3583-1/
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1170
https://access.redhat.com/errata/RHSA-2018:1130
https://www.debian.org/security/2018/dsa-4187
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://access.redhat.com/errata/RHSA-2018:1319
https://access.redhat.com/errata/RHSA-2018:1737
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html
http://www.ubuntu.com/usn/USN-3583-1
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html
http://www.ubuntu.com/usn/USN-3583-2
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html
https://support.f5.com/csp/article/K18352029
http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html
https://www.arista.com/en/support/advisories-notices/security-advisories/4577-security-advisory-34
http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.29:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.30:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.33:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.34:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.31:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.32:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.35:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.10.5:*:*:*:*:*:*:*

Information

Published : 2018-01-03 06:29

Updated : 2021-11-17 22:16


NVD link : CVE-2017-18017

Mitre link : CVE-2017-18017


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free