2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2017-15129" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2018-01-09T19:29:00.217" ,
2024-02-08 03:00:30 +00:00
"lastModified" : "2024-02-08T02:07:55.783" ,
"vulnStatus" : "Analyzed" ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely."
} ,
{
"lang" : "es" ,
"value" : "Se ha descubierto una vulnerabilidad en los nombres de espacio de red que afecta al kernel de Linux en versiones anteriores a la 4.14.11. La funci\u00f3n get_net_ns_by_id() en net/core/net_namespace.c no verifica el valor net::count una vez que ha encontrado una red peer en el ids netns_ids, lo que podr\u00eda conducir a una doble liberaci\u00f3n (double free) y a una corrupci\u00f3n de memoria. Esta vulnerabilidad podr\u00eda permitir que un usuario local sin privilegios provoque una corrupci\u00f3n de memoria en el sistema, desembocando en un cierre inesperado. Debido a la naturaleza del error, no puede descartarse totalmente el escalado de privilegios, aunque se cree que es improbable."
}
] ,
"metrics" : {
2024-02-08 03:00:30 +00:00
"cvssMetricV31" : [
2023-04-24 12:24:31 +02:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
2024-02-08 03:00:30 +00:00
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "LOCAL" ,
2024-02-08 03:00:30 +00:00
"attackComplexity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
2024-02-08 03:00:30 +00:00
"baseScore" : 4.7 ,
2023-04-24 12:24:31 +02:00
"baseSeverity" : "MEDIUM"
} ,
2024-02-08 03:00:30 +00:00
"exploitabilityScore" : 1.0 ,
2023-04-24 12:24:31 +02:00
"impactScore" : 3.6
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:N/I:N/A:C" ,
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "COMPLETE" ,
"baseScore" : 4.9
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
2024-02-08 03:00:30 +00:00
"source" : "nvd@nist.gov" ,
2023-04-24 12:24:31 +02:00
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-362"
}
]
} ,
{
2024-02-08 03:00:30 +00:00
"source" : "secalert@redhat.com" ,
2023-04-24 12:24:31 +02:00
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
2024-02-08 03:00:30 +00:00
"value" : "CWE-362"
2023-04-24 12:24:31 +02:00
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
2024-02-08 03:00:30 +00:00
"versionStartIncluding" : "4.0" ,
2023-04-24 12:24:31 +02:00
"versionEndExcluding" : "4.14.11" ,
2024-02-08 03:00:30 +00:00
"matchCriteriaId" : "55CA5D5E-49D9-4AA4-B2AD-DA674E51B9A8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:4.15:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "B6EF6556-06A6-4700-B61F-533167096BEF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:4.15:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "69A04496-EA26-42E0-A553-413BF2A78AD7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:4.15:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "14E8986E-B317-40EA-B0B5-5D2922D2AF5B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:4.15:rc4:*:*:*:*:*:*" ,
"matchCriteriaId" : "EBC4657A-0239-47DF-B582-87D8DFA69439"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DBEACBFF-6D05-4B69-BF7A-F7E539D9BF6E"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" ,
"matchCriteriaId" : "815D70A8-47D3-459C-A32C-9FEACA0659D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" ,
"matchCriteriaId" : "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9070C9D8-A14A-467F-8253-33B966C16886"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D9F97AEB-F4DB-4F1F-A69C-5EF8CBBFAFE6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "33C068A4-3780-4EAB-A937-6082DF847564"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F96E3779-F56A-45FF-BB3D-4980527D721E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "83737173-E12E-4641-BC49-0BD84A6B29D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "566507B6-AC95-47F7-A3FB-C6F414E45F51"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6C34DD8A-17C5-489C-9140-447784F27607"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1CDCFF34-6F1D-45A1-BE37-6A0E17B04801"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "277E06A0-90F5-4F97-94EA-5A18E242B800"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DF307B8C-4548-47D9-9D2E-F61AE0BFAADD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_real_time:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1BA3C94F-5FA1-4805-A3EC-6E27AE9AB10C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "36E85B24-30F2-42AB-9F68-8668C0FCC5E3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "37CE1DC7-72C5-483C-8921-0B462C8284D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "51EF4996-72F4-4FA4-814F-F5991E7A8318"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D99A687E-EAE6-417E-A88E-D0082BC194CD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D5F7E11E-FB34-4467-8919-2B6BEAABF665"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "17F256A9-D3B9-4C72-B013-4EFD878BFEA8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8C7E9628-0915-4C49-8929-F5E060A20CBB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "825ECE2D-E232-46E0-A047-074B34DB1E97"
2023-04-24 12:24:31 +02:00
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=21b5944350052d2583e82dd59b19a9ba94a007f0" ,
"source" : "secalert@redhat.com" ,
"tags" : [
2024-02-08 03:00:30 +00:00
"Patch"
2023-04-24 12:24:31 +02:00
]
} ,
{
"url" : "http://seclists.org/oss-sec/2018/q1/7" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/102485" ,
2024-02-08 03:00:30 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2018:0654" ,
2024-02-08 03:00:30 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2018:0676" ,
2024-02-08 03:00:30 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2018:1062" ,
2024-02-08 03:00:30 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:1946" ,
2024-02-08 03:00:30 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://access.redhat.com/security/cve/CVE-2017-15129" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1531174" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Issue Tracking" ,
2024-02-08 03:00:30 +00:00
"Patch" ,
2023-04-24 12:24:31 +02:00
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/torvalds/linux/commit/21b5944350052d2583e82dd59b19a9ba94a007f0" ,
"source" : "secalert@redhat.com" ,
"tags" : [
2024-02-08 03:00:30 +00:00
"Patch"
2023-04-24 12:24:31 +02:00
]
} ,
{
"url" : "https://marc.info/?l=linux-netdev&m=151370451121029&w=2" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List" ,
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://marc.info/?t=151370468900001&r=1&w=2" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3617-1/" ,
2024-02-08 03:00:30 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://usn.ubuntu.com/3617-2/" ,
2024-02-08 03:00:30 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://usn.ubuntu.com/3617-3/" ,
2024-02-08 03:00:30 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://usn.ubuntu.com/3619-1/" ,
2024-02-08 03:00:30 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://usn.ubuntu.com/3619-2/" ,
2024-02-08 03:00:30 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://usn.ubuntu.com/3632-1/" ,
2024-02-08 03:00:30 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11" ,
"source" : "secalert@redhat.com" ,
"tags" : [
2024-02-08 03:00:30 +00:00
"Release Notes"
2023-04-24 12:24:31 +02:00
]
}
]
}