The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/97407 | vdb entry third party advisory |
https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893 | issue tracking third party advisory patch |
http://openwall.com/lists/oss-security/2017/04/04/8 | third party advisory mailing list |
https://access.redhat.com/errata/RHSA-2017:2669 | vendor advisory |
https://access.redhat.com/errata/RHSA-2018:1854 | vendor advisory |
https://usn.ubuntu.com/3754-1/ | vendor advisory |
https://twitter.com/danieljiang0415/status/845116665184497664 | third party advisory |
https://github.com/danieljiang0415/android_kernel_crash_poc | third party advisory |
https://www.exploit-db.com/exploits/42135/ | exploit |
https://access.redhat.com/errata/RHSA-2017:2077 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:1842 | vendor advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893 | issue tracking third party advisory patch |