BSA-2017-351

Brocade Fabric OS

2 more products

21383

27 October 2017

25 August 2017

Closed

Medium

5.5

N/A

CVE-2017-8890

Summary

Security Advisory ID : BSA-2017-351

Component : Linux Kernel

Revision : 3.0: Interim

The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call. An unprivileged local user could use this flaw to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.

Affected Products

Brocade is investigating its product lines to determine which products may be affected by this vulnerability and the impact on each affected product.

Products Confirmed Not Vulnerable

Brocade Fabric OS, Brocade FastIron OS, Brocade NetIron OS, Brocade Network OS, Brocade ServerIron ADX, Brocade SLX-OS, and Brocade Workflow Composer are confirmed not affected by this vulnerability.

Workaround

There are no workarounds that address this vulnerability.


Revision History

Version Change Date
1.0 Initial Publication August 25, 2017
2.0 Updated to address NOS, SLX, & WC October 13, 2017
3.0 Updated to address ADX October 27, 2017