vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-7979): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | 04/19/2017 | 06/08/2017 | 11/27/2024 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
04/19/2017
Added
06/08/2017
Modified
11/27/2024
Description
The cookie feature in the packet action API implementation in net/sched/act_api.c in the Linux kernel 4.11.x through 4.11-rc7 mishandles the tb nlattr array, which allows local users to cause a denial of service (uninitialized memory access and refcount underflow, and system hang or crash) or possibly have unspecified other impact via "tc filter add" commands in certain contexts. NOTE: this does not affect stable kernels, such as 4.10.x, from kernel.org.
Solution(s)
ubuntu-upgrade-linux-image-4-10-0-1006-raspi2ubuntu-upgrade-linux-image-4-10-0-22-genericubuntu-upgrade-linux-image-4-10-0-22-generic-lpaeubuntu-upgrade-linux-image-4-10-0-22-lowlatencyubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-raspi2
References
- CVE-2017-7979
- https://attackerkb.com/topics/CVE-2017-7979
- NVD-CVE-2017-7979
- UBUNTU-USN-3312-1
- UBUNTU-USN-3312-2
- UBUNTU-USN-3313-1
- UBUNTU-USN-3313-2
- UBUNTU-USN-3314-1
- UBUNTU-USN-3343-1
- UBUNTU-USN-3343-2
- UBUNTU-USN-3359-1
- UBUNTU-USN-3360-1
- UBUNTU-USN-3360-2
- UBUNTU-USN-3361-1
- UBUNTU-USN-3422-1
- UBUNTU-USN-3422-2
- UBUNTU-USN-3583-1
- UBUNTU-USN-3583-2
- UBUNTU-USN-3754-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.