CVE-2017-7533

Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=49d31c2f389acfe83417083e1208422b4091cd9e Issue Tracking Patch Third Party Advisory
http://openwall.com/lists/oss-security/2017/08/03/2 Mailing List Patch Third Party Advisory
http://www.debian.org/security/2017/dsa-3927 Third Party Advisory
http://www.debian.org/security/2017/dsa-3945 Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/06/27/7 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/06/28/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/06/28/2 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/100123 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039075 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:2473 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2585 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2669 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2770 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2869 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1468283 Issue Tracking Patch Third Party Advisory
https://github.com/torvalds/linux/commit/49d31c2f389acfe83417083e1208422b4091cd9e Issue Tracking Patch Third Party Advisory
https://patchwork.kernel.org/patch/9755753/ Issue Tracking Patch Third Party Advisory
https://patchwork.kernel.org/patch/9755757/ Issue Tracking Patch Third Party Advisory
https://source.android.com/security/bulletin/2017-12-01 Third Party Advisory
https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1408967.html Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Jun 2023, 15:57

Type Values Removed Values Added
References (REDHAT) https://access.redhat.com/errata/RHSA-2017:2669 - (REDHAT) https://access.redhat.com/errata/RHSA-2017:2669 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2017:2869 - (REDHAT) https://access.redhat.com/errata/RHSA-2017:2869 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2017:2770 - (REDHAT) https://access.redhat.com/errata/RHSA-2017:2770 - Third Party Advisory
References (CONFIRM) https://source.android.com/security/bulletin/2017-12-01 - (CONFIRM) https://source.android.com/security/bulletin/2017-12-01 - Third Party Advisory
References (DEBIAN) http://www.debian.org/security/2017/dsa-3927 - (DEBIAN) http://www.debian.org/security/2017/dsa-3927 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2019/06/28/1 - (MLIST) http://www.openwall.com/lists/oss-security/2019/06/28/1 - Mailing List, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2019/06/28/2 - (MLIST) http://www.openwall.com/lists/oss-security/2019/06/28/2 - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2017:2585 - (REDHAT) https://access.redhat.com/errata/RHSA-2017:2585 - Third Party Advisory
References (DEBIAN) http://www.debian.org/security/2017/dsa-3945 - (DEBIAN) http://www.debian.org/security/2017/dsa-3945 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2019/06/27/7 - (MLIST) http://www.openwall.com/lists/oss-security/2019/06/27/7 - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2017:2473 - (REDHAT) https://access.redhat.com/errata/RHSA-2017:2473 - Third Party Advisory
References (MISC) https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1408967.html - (MISC) https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1408967.html - Third Party Advisory

Information

Published : 2017-08-05 16:29

Updated : 2024-02-28 16:04


NVD link : CVE-2017-7533

Mitre link : CVE-2017-7533

CVE.ORG link : CVE-2017-7533


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')