Vulnerability Description
The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 2.6.14, < 3.2.97 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.htmlThird Party Advisory
- http://lists.openwall.net/netdev/2017/12/04/224Third Party Advisory
- http://www.openwall.com/lists/oss-security/2017/12/05/1Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/102056Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:0399Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0676Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1062Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1130Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1170Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1216Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1319Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:3822Third Party Advisory
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxurThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.htmlThird Party Advisory
- https://usn.ubuntu.com/3581-1/Third Party Advisory
FAQ
What is CVE-2017-8824?
CVE-2017-8824 is a vulnerability with a CVSS score of 7.8 (HIGH). The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system ...
How severe is CVE-2017-8824?
CVE-2017-8824 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-8824?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.