CVE-2017-7541
Description
The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A buffer overflow in brcmf_cfg80211_mgmt_tx() in Linux kernel before 4.12.3 allows local users to cause a denial of service or potentially gain privileges via crafted NL80211_CMD_FRAME Netlink packet.
Vulnerability
The vulnerability is a buffer overflow in the brcmf_cfg80211_mgmt_tx() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c. It affects Linux kernels from v3.9-rc1 to v4.13-rc1, before the fix in version 4.12.3 [2]. The function is reachable when the system has a Broadcom wireless driver (brcmfmac) loaded and a local user sends a crafted NL80211_CMD_FRAME Netlink packet [1][2].
Exploitation
An attacker must be a local user with the ability to send Netlink messages [2]. The attacker sends a specially crafted NL80211_CMD_FRAME packet via netlink to the kernel, triggering the overflow in brcmf_cfg80211_mgmt_tx() [2]. No special privileges beyond local access are required, but the brcmfmac driver must be active [2].
Impact
Successful exploitation results in kernel memory corruption, leading to a system crash (denial of service) [2]. While privilege escalation is theoretically possible due to the memory corruption, it is considered unlikely by Red Hat [2]. The primary impact is a local denial of service vulnerability, but arbitrary code execution cannot be entirely ruled out [2].
Mitigation
The vulnerability is fixed in Linux kernel version 4.12.3 [2]. Red Hat has released updates: RHSA-2017:2930 for RHEL 7, RHSA-2017:2863 for RHEL 6, and RHSA-2017:2931 [1][2][3]. Android devices with Broadcom wireless chipsets are also affected; the November 2017 Android Security Bulletin addresses this issue [4]. Users should apply the appropriate kernel updates from their distribution.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
58- osv-coords57 versionspkg:rpm/opensuse/kernel-source&distro=openSUSE%20Tumbleweedpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-xen&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_22&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_22&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_22&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_14&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12_Update_28&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS
< 5.14.6-1.4+ 56 more
- (no CPE)range: < 5.14.6-1.4
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.82-6.3.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.82-6.3.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.82-6.3.1
- (no CPE)range: < 3.12.61-52.101.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.82-6.3.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.82-6.3.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.3
- (no CPE)range: < 4.4.82-6.3.5
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.82-6.3.3
- (no CPE)range: < 4.4.88-18.1
- (no CPE)range: < 4.4.88-18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.82-6.3.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.82-6.3.1
- (no CPE)range: < 3.12.61-52.101.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.82-6.3.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.88-18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.82-6.3.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.82-6.3.1
- (no CPE)range: < 3.12.61-52.101.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.82-6.3.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.88-18.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.12.61-52.101.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 1-2.1
- (no CPE)range: < 1-2.1
- (no CPE)range: < 1-2.1
- (no CPE)range: < 1-2.4
- (no CPE)range: < 1-2.1
- (no CPE)range: < 1-8.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
16- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdIssue TrackingPatchThird Party Advisory
- openwall.com/lists/oss-security/2017/07/24/2nvdMailing ListPatchThird Party Advisory
- bugzilla.novell.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- github.com/torvalds/linux/commit/8f44c9a41386729fea410e688959ddaa9d51be7cnvdIssue TrackingPatchThird Party Advisory
- www.spinics.net/lists/stable/msg180994.htmlnvdPatchThird Party Advisory
- www.debian.org/security/2017/dsa-3927nvdThird Party Advisory
- www.debian.org/security/2017/dsa-3945nvdThird Party Advisory
- www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.3nvdRelease NotesVendor Advisory
- www.securityfocus.com/bid/99955nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1038981nvdThird Party AdvisoryVDB Entry
- access.redhat.com/errata/RHSA-2017:2863nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:2918nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:2930nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:2931nvdThird Party Advisory
- source.android.com/security/bulletin/2017-11-01nvdThird Party Advisory
News mentions
0No linked articles in our index yet.