Description
The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4073-1 | linux security update |
EUVD |
EUVD-2017-8869 | The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges. |
Ubuntu USN |
USN-3581-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3581-2 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-3581-3 | Linux kernel (Raspberry Pi 2) vulnerabilities |
Ubuntu USN |
USN-3582-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3582-2 | Linux kernel (Xenial HWE) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:59:17.421Z
Reserved: 2017-12-15T00:00:00.000Z
Link: CVE-2017-17712
No data.
Status : Modified
Published: 2017-12-16T01:29:00.190
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-17712
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN