CVE-2017-17712
low-risk
Published 2017-12-16
The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.
Do I need to act?
-
0.08% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.0/10
High
LOCAL
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (20)
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0502
Third Party Advisory
https://source.android.com/security/bulletin/pixel/2018-04-01
Third Party Advisory
https://usn.ubuntu.com/3581-1/
Third Party Advisory
https://usn.ubuntu.com/3581-2/
Third Party Advisory
https://usn.ubuntu.com/3581-3/
Third Party Advisory
https://usn.ubuntu.com/3582-1/
Third Party Advisory
https://usn.ubuntu.com/3582-2/
Third Party Advisory
https://www.debian.org/security/2017/dsa-4073
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0502
Third Party Advisory
https://source.android.com/security/bulletin/pixel/2018-04-01
Third Party Advisory
https://usn.ubuntu.com/3581-1/
Third Party Advisory
https://usn.ubuntu.com/3581-2/
Third Party Advisory
https://usn.ubuntu.com/3581-3/
Third Party Advisory
https://usn.ubuntu.com/3582-1/
Third Party Advisory
https://usn.ubuntu.com/3582-2/
Third Party Advisory
https://www.debian.org/security/2017/dsa-4073
23
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal