CVE-2017-7979
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
19/04/2017
Last modified:
20/04/2025
Description
The cookie feature in the packet action API implementation in net/sched/act_api.c in the Linux kernel 4.11.x through 4.11-rc7 mishandles the tb nlattr array, which allows local users to cause a denial of service (uninitialized memory access and refcount underflow, and system hang or crash) or possibly have unspecified other impact via "tc filter add" commands in certain contexts. NOTE: this does not affect stable kernels, such as 4.10.x, from kernel.org.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:4.11:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.11:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.11:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.11:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://marc.info/?l=linux-netdev&m=149200742616349
- http://marc.info/?l=linux-netdev&m=149200746116365
- http://marc.info/?l=linux-netdev&m=149200746116366
- http://marc.info/?l=linux-netdev&m=149251041420194
- http://marc.info/?l=linux-netdev&m=149251041420195
- http://www.securityfocus.com/bid/97969
- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1682368
- https://bugzilla.proxmox.com/show_bug.cgi?id=1351
- http://marc.info/?l=linux-netdev&m=149200742616349
- http://marc.info/?l=linux-netdev&m=149200746116365
- http://marc.info/?l=linux-netdev&m=149200746116366
- http://marc.info/?l=linux-netdev&m=149251041420194
- http://marc.info/?l=linux-netdev&m=149251041420195
- http://www.securityfocus.com/bid/97969
- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1682368
- https://bugzilla.proxmox.com/show_bug.cgi?id=1351



