Vulnerability identifier: #VU92796
Vulnerability risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-2636
CWE-ID:
CWE-362
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to execute arbitrary code.
Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.
Mitigation
Install update from vendor's repository.
Vulnerable software versions
Linux kernel: All versions
External links
https://bugzilla.redhat.com/show_bug.cgi?id=1428319
https://www.openwall.com/lists/oss-security/2017/03/07/6
https://www.securityfocus.com/bid/96732
https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html
https://www.securitytracker.com/id/1037963
https://www.debian.org/security/2017/dsa-3804
https://access.redhat.com/errata/RHSA-2017:1488
https://access.redhat.com/errata/RHSA-2017:1233
https://access.redhat.com/errata/RHSA-2017:1232
https://access.redhat.com/errata/RHSA-2017:1126
https://access.redhat.com/errata/RHSA-2017:1125
https://access.redhat.com/errata/RHSA-2017:0986
https://access.redhat.com/errata/RHSA-2017:0933
https://access.redhat.com/errata/RHSA-2017:0932
https://access.redhat.com/errata/RHSA-2017:0931
https://access.redhat.com/errata/RHSA-2017:0892
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.