First published: Fri Dec 01 2017(Updated: )
Last updated 29 November 2024
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.14<3.2.97 | |
Linux Kernel | >=3.3<3.16.52 | |
Linux Kernel | >=3.17<3.18.95 | |
Linux Kernel | >=3.19<4.1.50 | |
Linux Kernel | >=4.2<4.4.116 | |
Linux Kernel | >=4.5<4.9.82 | |
Linux Kernel | >=4.10<4.14.20 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.22-1 |
Blacklist the dccp ipv[46] autoloading aliases by adding the following lines to /etc/modprobe.d/blacklist-dccp.conf: alias net-pf-2-proto-0-type-6 off alias net-pf-2-proto-33-type-6 off alias net-pf-10-proto-0-type-6 off alias net-pf-10-proto-33-type-6 off
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8824 is classified as a high severity vulnerability due to the potential for privilege escalation or denial of service.
To fix CVE-2017-8824, users should upgrade to a patched version of the Linux kernel, specifically versions above 4.14.20.
CVE-2017-8824 affects local users of the Linux kernel versions up to 4.14.3.
CVE-2017-8824 is a use-after-free vulnerability that can be exploited during the DCCP_LISTEN state.
CVE-2017-8824 can be exploited via an AF_UNSPEC connect system call, potentially leading to privilege escalation.