Description
The netfilter subsystem in the Linux kernel before 4.9 mishandles IPv6 reassembly, which allows local users to cause a denial of service (integer overflow, out-of-bounds write, and GPF) or possibly have unspecified other impact via a crafted application that makes socket, connect, and writev system calls, related to net/ipv6/netfilter/nf_conntrack_reasm.c and net/ipv6/netfilter/nf_defrag_ipv6_hooks.c.
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/94626
Patch x_refsource_confirm
https://github.com/torvalds/linux/commit/9b57da0630c9fd36ed7a20fc0f98dc82cc0777fa
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/12/01/10
Patch, Vendor Advisory x_refsource_confirm
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b57da0630c9fd36ed7a20fc0f98dc82cc0777fa
Mailing List x_refsource_confirm
https://groups.google.com/forum/#%21topic/syzkaller/GFbGpX7nTEo
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1400904
Mailing List, Patch mailing-list
x_refsource_mlist
https://www.spinics.net/lists/netdev/msg407525.html
Scores
CVSS v3
7.8
EPSS
0.0005
EPSS Percentile
15.5%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-787
Status
published
Products (1)
linux/linux_kernel
< 4.8.15
Published
Dec 28, 2016
Tracked Since
Feb 18, 2026