Learn about CVE-2017-7979 affecting Linux kernel versions 4.11.x through 4.11-rc7. Discover how local users can exploit this vulnerability to cause denial of service attacks and system crashes.
Linux kernel versions 4.11.x through 4.11-rc7 are affected by a vulnerability in the packet action API implementation, allowing local users to launch denial of service attacks and potentially cause system crashes.
Understanding CVE-2017-7979
This CVE involves mishandling of the tb nlattr array in the cookie function of the packet action API within the Linux kernel.
What is CVE-2017-7979?
The flaw in the Linux kernel versions 4.11.x through 4.11-rc7 allows local users to trigger denial of service attacks through uninitialized memory access and refcount underflow, potentially leading to system hang or crash. Additionally, unspecified impacts may occur when using specific "tc filter add" commands.
The Impact of CVE-2017-7979
The vulnerability enables local users to exploit uninitialized memory access and refcount underflow, resulting in system hang or crash. Other unspecified impacts may also occur when executing certain commands.
Technical Details of CVE-2017-7979
The technical aspects of the vulnerability in the Linux kernel version 4.11.x through 4.11-rc7.
Vulnerability Description
The cookie function in the packet action API implementation mishandles the tb nlattr array, allowing local users to initiate denial of service attacks and potentially cause system crashes.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Steps to address and prevent the CVE-2017-7979 vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates