Vulnerability Details : CVE-2017-5548
drivers/net/ieee802154/atusb.c in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
Vulnerability category: OverflowMemory CorruptionDenial of service
Products affected by CVE-2017-5548
- cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-5548
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 22 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-5548
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2017-5548
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-5548
-
https://bugzilla.redhat.com/show_bug.cgi?id=1416110
1416110 – (CVE-2017-5548) CVE-2017-5548 kernel: Using stack for buffers in ieee802154Issue Tracking;Patch
-
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=05a974efa4bdf6e2a150e3f27dc6fcf0a9ad5655
kernel/git/torvalds/linux.git - Linux kernel source treeIssue Tracking;Patch;Third Party Advisory
-
https://github.com/torvalds/linux/commit/05a974efa4bdf6e2a150e3f27dc6fcf0a9ad5655
ieee802154: atusb: do not use the stack for buffers to make them DMA … · torvalds/linux@05a974e · GitHubMailing List;Patch;Third Party Advisory
-
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.6
Release Notes;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2017/01/21/3
oss-security - Re: CVE REQUEST: linux kernel: process with pgid zero able to crash kernelMailing List;Patch;Third Party Advisory
-
http://www.securityfocus.com/bid/95710
Linux Kernel CVE-2017-5548 Local Denial of Service VulnerabilityThird Party Advisory;VDB Entry
Jump to