Description
The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-922-1 | linux security update |
Ubuntu USN |
USN-3256-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-3256-2 | Linux kernel (HWE) vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T15:56:36.470Z
Reserved: 2017-03-29T00:00:00.000Z
Link: CVE-2017-7308
No data.
Status : Modified
Published: 2017-03-29T20:59:00.373
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-7308
OpenCVE Enrichment
No data.
Debian DLA
Ubuntu USN