{"id":"CVE-2017-7308","details":"The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.","modified":"2026-04-16T06:16:55.426614139Z","published":"2017-03-29T20:59:00.373Z","related":["SUSE-SU-2017:1059-1","SUSE-SU-2017:1060-1","SUSE-SU-2017:1064-1","SUSE-SU-2017:1183-1","SUSE-SU-2017:1247-1","SUSE-SU-2017:1277-1","SUSE-SU-2017:1278-1","SUSE-SU-2017:1279-1","SUSE-SU-2017:1280-1","SUSE-SU-2017:1281-1","SUSE-SU-2017:1283-1","SUSE-SU-2017:1284-1","SUSE-SU-2017:1285-1","SUSE-SU-2017:1287-1","SUSE-SU-2017:1288-1","SUSE-SU-2017:1289-1","SUSE-SU-2017:1290-1","SUSE-SU-2017:1291-1","SUSE-SU-2017:1293-1","SUSE-SU-2017:1294-1","SUSE-SU-2017:1295-1","SUSE-SU-2017:1297-1","SUSE-SU-2017:1299-1","SUSE-SU-2017:1300-1","SUSE-SU-2017:1301-1","SUSE-SU-2017:1302-1","SUSE-SU-2017:1303-1","SUSE-SU-2017:1308-1","SUSE-SU-2017:1360-1","SUSE-SU-2017:1990-1","SUSE-SU-2017:2342-1","SUSE-SU-2017:2525-1"],"references":[{"type":"ADVISORY","url":"https://www.exploit-db.com/exploits/41994/"},{"type":"ADVISORY","url":"https://www.exploit-db.com/exploits/44654/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/97234"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"type":"ADVISORY","url":"https://patchwork.ozlabs.org/patch/744811/"},{"type":"ADVISORY","url":"https://patchwork.ozlabs.org/patch/744812/"},{"type":"ADVISORY","url":"https://source.android.com/security/bulletin/2017-07-01"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1297"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1298"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1308"},{"type":"ADVISORY","url":"https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html"},{"type":"ADVISORY","url":"https://patchwork.ozlabs.org/patch/744813/"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-7308.json","unresolved_ranges":[{"events":[{"introduced":"2.6.27"},{"fixed":"3.2.89"}]},{"events":[{"introduced":"3.3"},{"fixed":"3.10.107"}]},{"events":[{"introduced":"3.11"},{"fixed":"3.12.74"}]},{"events":[{"introduced":"3.13"},{"fixed":"3.16.44"}]},{"events":[{"introduced":"3.17"},{"fixed":"3.18.52"}]},{"events":[{"introduced":"3.19"},{"fixed":"4.1.41"}]},{"events":[{"introduced":"4.2"},{"fixed":"4.4.66"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.26"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.10.14"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}