Discover more... ©milankantony

7 year old Linux Kernel Vulnerability get patched

✔✔✔rating

Common Vulnerabilities and Exposures ,CVE-2017-2636 gets patch.

 Way back at 2009  a large number of Linux distros, including Red Hat, Debian, Fedora, OpenSUSE, and Ubuntu has been affected with condition issue in the N_HLDC Linux kernel driver – which is responsible for dealing with High-Level Data Link Control (HDLC) data – that leads to double-free vulnerability.


Double Free” is one of the most common memory corruption bug that occurs when the application releases same memory location twice by calling the free() function on the same allocated memory.An unauthenticated attacker may leverage this vulnerability to inject and execute arbitrary code in the security context of currently logged in user.


Positive Technologies researcher Alexander Popov discovered a race condition issue in the N_HLDC Linux kernel driver – which is responsible for dealing with High-Level Data Link Control (HDLC) data – that leads to double-free vulnerability.


Since the flaw dates back to June 2009, Linux enterprise servers and devices have been vulnerable for a long time, but according to Positive Technologies, it is hard to say whether this vulnerability has actively been exploited.

The researcher detected the vulnerability during system calls testing with the syzkaller fuzzer, which is a security code auditing software developed by Google.

users are encouraged to install the latest security updates as soon as possible, but if unable to apply the patch, the researcher advised blocking the flawed module (n_hdlc) manually to safeguard enterprise as well as home use of the operating system.

Recommend for you



Most Read

Blog Archive

Scroll To Top