The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/socket.c.
http://www.securityfocus.com/bid/97141
https://github.com/torvalds/linux/commit/4ef1b2869447411ad3ef91ad7d4891a83c1a509a
https://github.com/torvalds/linux/commit/8605330aac5a5785630aec8f64378a54891937cc
https://lkml.org/lkml/2017/3/15/485
Source: MITRE
Published: 2017-03-28
Updated: 2017-03-31
Type: CWE-125
Base Score: 6.6
Vector: AV:L/AC:L/Au:N/C:C/I:N/A:C
Impact Score: 9.2
Exploitability Score: 3.9
Severity: MEDIUM
Base Score: 7.1
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Impact Score: 5.2
Exploitability Score: 1.8
Severity: HIGH