vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-2671): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:N/C:N/I:N/A:C) | 04/05/2017 | 06/08/2017 | 01/23/2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
04/05/2017
Added
06/08/2017
Modified
01/23/2025
Description
The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.
Solution(s)
ubuntu-upgrade-linux-image-3-13-0-157-genericubuntu-upgrade-linux-image-3-13-0-157-generic-lpaeubuntu-upgrade-linux-image-3-13-0-157-lowlatencyubuntu-upgrade-linux-image-3-13-0-157-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-157-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-157-powerpc-smpubuntu-upgrade-linux-image-3-13-0-157-powerpc64-embubuntu-upgrade-linux-image-3-13-0-157-powerpc64-smpubuntu-upgrade-linux-image-4-10-0-1006-raspi2ubuntu-upgrade-linux-image-4-10-0-22-genericubuntu-upgrade-linux-image-4-10-0-22-generic-lpaeubuntu-upgrade-linux-image-4-10-0-22-lowlatencyubuntu-upgrade-linux-image-4-10-0-27-genericubuntu-upgrade-linux-image-4-10-0-27-generic-lpaeubuntu-upgrade-linux-image-4-10-0-27-lowlatencyubuntu-upgrade-linux-image-4-4-0-1014-gkeubuntu-upgrade-linux-image-4-4-0-1018-awsubuntu-upgrade-linux-image-4-4-0-1057-raspi2ubuntu-upgrade-linux-image-4-4-0-1059-snapdragonubuntu-upgrade-linux-image-4-4-0-79-genericubuntu-upgrade-linux-image-4-4-0-79-generic-lpaeubuntu-upgrade-linux-image-4-4-0-79-lowlatencyubuntu-upgrade-linux-image-4-4-0-79-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-79-powerpc-smpubuntu-upgrade-linux-image-4-4-0-79-powerpc64-embubuntu-upgrade-linux-image-4-4-0-79-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtual
References
- CVE-2017-2671
- https://attackerkb.com/topics/CVE-2017-2671
- DEBIAN-DLA-922-1
- NVD-CVE-2017-2671
- UBUNTU-USN-3208-1
- UBUNTU-USN-3208-2
- UBUNTU-USN-3234-1
- UBUNTU-USN-3234-2
- UBUNTU-USN-3265-1
- UBUNTU-USN-3265-2
- UBUNTU-USN-3312-1
- UBUNTU-USN-3312-2
- UBUNTU-USN-3314-1
- UBUNTU-USN-3361-1
- UBUNTU-USN-3420-1
- UBUNTU-USN-3420-2
- UBUNTU-USN-3469-1
- UBUNTU-USN-3469-2
- UBUNTU-USN-3485-1
- UBUNTU-USN-3485-2
- UBUNTU-USN-3485-3
- UBUNTU-USN-3487-1
- UBUNTU-USN-3507-1
- UBUNTU-USN-3509-1
- UBUNTU-USN-3509-2
- UBUNTU-USN-3617-1
- UBUNTU-USN-3617-2
- UBUNTU-USN-3617-3
- UBUNTU-USN-3619-1
- UBUNTU-USN-3619-2
- UBUNTU-USN-3631-1
- UBUNTU-USN-3631-2
- UBUNTU-USN-3676-1
- UBUNTU-USN-3676-2
- UBUNTU-USN-3677-1
- UBUNTU-USN-3677-2
- UBUNTU-USN-3678-1
- UBUNTU-USN-3678-2
- UBUNTU-USN-3678-3
- UBUNTU-USN-3678-4
- UBUNTU-USN-3695-1
- UBUNTU-USN-3695-2
- UBUNTU-USN-3696-1
- UBUNTU-USN-3696-2
- UBUNTU-USN-3752-1
- UBUNTU-USN-3752-2
- UBUNTU-USN-3752-3
- UBUNTU-USN-3753-1
- UBUNTU-USN-3753-2
- UBUNTU-USN-3754-1
- UBUNTU-USN-3871-1
- UBUNTU-USN-3871-3
- UBUNTU-USN-3871-4
- UBUNTU-USN-3871-5
- UBUNTU-USN-4486-1
- UBUNTU-USN-4904-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.