First published: Thu Mar 02 2017(Updated: )
A race condition flaw was found in the N_HLDC Linux kernel driver when accessing n_hdlc.tbuf that can lead to double free. A local, unprivileged user able to set the HDLC line discipline on the tty device could use this flaw to increase their privileges on the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.31<3.2.87 | |
Linux Kernel | >=3.3<3.10.106 | |
Linux Kernel | >=3.11<3.12.72 | |
Linux Kernel | >=3.13<3.16.42 | |
Linux Kernel | >=3.17<3.18.49 | |
Linux Kernel | >=3.19<4.1.49 | |
Linux Kernel | >=4.2<4.4.54 | |
Linux Kernel | >=4.5<4.9.15 | |
Linux Kernel | >=4.10<4.10.3 | |
Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2636 is classified as a high severity vulnerability due to its potential to allow privilege escalation.
Local, unprivileged users on affected versions of the Linux kernel can exploit CVE-2017-2636.
CVE-2017-2636 exploits a race condition in the N_HLDC Linux kernel driver leading to a double free condition.
To fix CVE-2017-2636, it is recommended to update to a patched version of the Linux kernel that resolves this issue.
CVE-2017-2636 affects various versions of the Linux kernel, specifically those between 2.6.31 and 4.10.3.