CVE-2017-7558
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
26/07/2018
Last modified:
12/02/2023
Description
A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in sockaddr data structures used to export socket's diagnostic information. As a result, up to 100 bytes of the slab data could be leaked to a userspace.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.7 (including) | 4.13 (including) |
cpe:2.3:o:linux:linux_kernel:4.7:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:4.7:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:4.7:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:4.7:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:4.7:rc5:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:4.7:rc6:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:4.7:rc7:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://seclists.org/oss-sec/2017/q3/338
- http://www.securityfocus.com/bid/100466
- http://www.securitytracker.com/id/1039221
- https://access.redhat.com/errata/RHSA-2017:2918
- https://access.redhat.com/errata/RHSA-2017:2930
- https://access.redhat.com/errata/RHSA-2017:2931
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7558
- https://marc.info/?l=linux-netdev&m=150348777122761&w=2
- https://www.debian.org/security/2017/dsa-3981