Brocade Security Advisory |
|
|||||||||||||||||||||||||||||||||||||
Summary
The tcp_v6_syn_recv_sock function in
net/ipv6/tcp_ipv6.c in the Linux kernel mishandles inheritance, which allows
local users to cause a denial of service or possibly have unspecified other
impact via crafted system calls, a related issue to CVE-2017-8890. An
unprivileged local user could use this flaw to induce kernel memory
corruption on the system, leading to a crash. Due to the nature of the flaw,
privilege escalation cannot be fully ruled out, although we believe it is
unlikely.
Affected Products
Brocade is investigating its product lines to determine
which products may be affected by this vulnerability and the impact on each
affected product. Products
Confirmed Not Vulnerable
Brocade FastIron OS, Brocade NetIron OS,
Brocade ServerIron ADX, Brocade SLX-OS, and Brocade
Workflow Composer are confirmed not affected by this vulnerability. Workaround
There are no workarounds that address this vulnerability. Revision
History
Disclaimer
THIS DOCUMENT IS
PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT
IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE
INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED
HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE
VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE
RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. |