CVE-2017-15649

net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2a13f2d04c947adc536d19debb8fe66f110 Third Party Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e Third Party Advisory
http://patchwork.ozlabs.org/patch/813945/ Issue Tracking Third Party Advisory
http://patchwork.ozlabs.org/patch/818726/ Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6 Exploit Third Party Advisory
http://www.securityfocus.com/bid/101573 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:0151
https://access.redhat.com/errata/RHSA-2018:0152
https://access.redhat.com/errata/RHSA-2018:0181
https://blogs.securiteam.com/index.php/archives/3484 Third Party Advisory
https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110 Patch Third Party Advisory
https://github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69e Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://usn.ubuntu.com/3754-1/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2a13f2d04c947adc536d19debb8fe66f110 Third Party Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e Third Party Advisory
http://patchwork.ozlabs.org/patch/813945/ Issue Tracking Third Party Advisory
http://patchwork.ozlabs.org/patch/818726/ Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6 Exploit Third Party Advisory
http://www.securityfocus.com/bid/101573 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:0151
https://access.redhat.com/errata/RHSA-2018:0152
https://access.redhat.com/errata/RHSA-2018:0181
https://blogs.securiteam.com/index.php/archives/3484 Third Party Advisory
https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110 Patch Third Party Advisory
https://github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69e Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://usn.ubuntu.com/3754-1/
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:14

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2a13f2d04c947adc536d19debb8fe66f110 - Third Party Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2a13f2d04c947adc536d19debb8fe66f110 - Third Party Advisory
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e - Third Party Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e - Third Party Advisory
References () http://patchwork.ozlabs.org/patch/813945/ - Issue Tracking, Third Party Advisory () http://patchwork.ozlabs.org/patch/813945/ - Issue Tracking, Third Party Advisory
References () http://patchwork.ozlabs.org/patch/818726/ - Third Party Advisory () http://patchwork.ozlabs.org/patch/818726/ - Third Party Advisory
References () http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6 - Exploit, Third Party Advisory () http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6 - Exploit, Third Party Advisory
References () http://www.securityfocus.com/bid/101573 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/101573 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:0151 - () https://access.redhat.com/errata/RHSA-2018:0151 -
References () https://access.redhat.com/errata/RHSA-2018:0152 - () https://access.redhat.com/errata/RHSA-2018:0152 -
References () https://access.redhat.com/errata/RHSA-2018:0181 - () https://access.redhat.com/errata/RHSA-2018:0181 -
References () https://blogs.securiteam.com/index.php/archives/3484 - Third Party Advisory () https://blogs.securiteam.com/index.php/archives/3484 - Third Party Advisory
References () https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110 - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110 - Patch, Third Party Advisory
References () https://github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69e - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69e - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html - () https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html -
References () https://usn.ubuntu.com/3754-1/ - () https://usn.ubuntu.com/3754-1/ -

Information

Published : 2017-10-19 22:29

Updated : 2024-11-21 03:14


NVD link : CVE-2017-15649

Mitre link : CVE-2017-15649

CVE.ORG link : CVE-2017-15649


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')