7.8
CVSSv3

CVE-2017-6347

Published: 01/03/2017 Updated: 10/02/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel prior to 4.10.1 has incorrect expectations about skb data layout, which allows local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the kernel ...
The skbs processed by ip_cmsg_recv() are not guaranteed to be linear (eg when sending UDP packets over loopback with MSGMORE) Using csum_partial() on potentially the whole skb len is dangerous; instead be on the safe side and use skb_checksum() This may lead to an infoleak as the kernel memory may be checksummed and sent as part of the packet ...
The skbs processed by ip_cmsg_recv() are not guaranteed to be linear (eg when sending UDP packets over loopback with MSGMORE) Using csum_partial() on potentially the whole skb len is dangerous; instead be on the safe side and use skb_checksum() This may lead to an infoleak as the kernel memory may be checksummed and sent as part of the packet ...