Vulnerability discovered in Linux HDLC driver

This is Yamada from the Systems Department

A vulnerability in the Linux kernel, announced on March 7th, was caused by a very old component.
(Primary source:
CVE-2017-2636)

of service (double free) by setting the
A race condition in the `n_hdlc.c` driver in the Linux kernel through version 4.10.1 allows local users to gain privileges or causes a denial

point-to-multipoint communication, similar to
is a communication technology used for

*Beep beep beep*. The screen is Windows.

It's not that you don't need to worry because you're not using a modem driver; please
this page.see

.
The n_hdlc kernel module will be automatically loaded when an application attempts to use the HDLC line discipline from userspace

So it seems like you need to be careful

This page provides solutions

​# echo "install n_hdlc /bin/true" >> /etc/modprobe.d/disable-n_hdlc.conf

They have posted a solution to prevent the n_hdlc module from being loaded by restarting the computer as follows

applies to Red Hat Enterprise Linux 6, 7, and Red Hat Enterprise MRG 2, so
be sure to check for updates to these patches.

Now, if you're a Beyond MSP user, we handle everything from checking for security vulnerabilities to addressing them. If
you're exhausted from dealing with the constant stream of vulnerability updates,contact us hereand you'll have an easier time!

If you found this article helpful,please give it a "Like"!
0
Loading...
0 votes, average: 0.00 / 10
845
X Facebook Hatena Bookmark pocket

The person who wrote this article

About the author