Oval Definition:oval:org.opensuse.security:def:20177979
Revision Date:2022-05-20Version:1
Title:CVE-2017-7979
Description:

The cookie feature in the packet action API implementation in net/sched/act_api.c in the Linux kernel 4.11.x through 4.11-rc7 mishandles the tb nlattr array, which allows local users to cause a denial of service (uninitialized memory access and refcount underflow, and system hang or crash) or possibly have unspecified other impact via "tc filter add" commands in certain contexts. NOTE: this does not affect stable kernels, such as 4.10.x, from kernel.org.
Family:unixClass:vulnerability
Status:Reference(s):Mitre CVE-2017-7979
SUSE CVE-2017-7979
Platform(s):SUSE Linux Enterprise Desktop 12 SP1
SUSE Linux Enterprise Desktop 12 SP2
SUSE Linux Enterprise Server 12 SP1
SUSE Linux Enterprise Server 12 SP2
Product(s):
Definition Synopsis
  • SUSE Linux Enterprise Desktop 12 SP1 is installed
  • AND Package Information
  • kernel-default is not affected
  • OR kernel-source is not affected
  • Definition Synopsis
  • Release Information
  • SUSE Linux Enterprise Desktop 12 SP1 is installed
  • AND
  • kernel-default is not affected
  • OR kernel-source is not affected
  • OR Package Information
  • SUSE Linux Enterprise Desktop 12 SP2 is installed
  • AND
  • kernel-default is affected
  • OR kernel-source is affected
  • Definition Synopsis
  • Release Information
  • SUSE Linux Enterprise Desktop 12 SP1 is installed
  • OR SUSE Linux Enterprise Server 12 SP1 is installed
  • OR SUSE Linux Enterprise Server 12 SP2 is installed
  • AND Package Information
  • kernel-default is not affected
  • OR kernel-source is not affected
  • Definition Synopsis
  • Release Information
  • SUSE Linux Enterprise Server 12 SP1 is installed
  • OR SUSE Linux Enterprise Server 12 SP2 is installed
  • AND Package Information
  • kernel-default is not affected
  • OR kernel-source is not affected
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2 is installed
  • AND Package Information
  • kernel-default is not affected
  • OR kernel-source is not affected
  • BACK