Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=49d31c2f389acfe83417083e1208422b4091cd9e - Issue Tracking, Patch, Third Party Advisory | |
References | () http://openwall.com/lists/oss-security/2017/08/03/2 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.debian.org/security/2017/dsa-3927 - Third Party Advisory | |
References | () http://www.debian.org/security/2017/dsa-3945 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2019/06/27/7 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2019/06/28/1 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2019/06/28/2 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/100123 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039075 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2017:2473 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2585 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2669 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2770 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2869 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1468283 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/torvalds/linux/commit/49d31c2f389acfe83417083e1208422b4091cd9e - Issue Tracking, Patch, Third Party Advisory | |
References | () https://patchwork.kernel.org/patch/9755753/ - Issue Tracking, Patch, Third Party Advisory | |
References | () https://patchwork.kernel.org/patch/9755757/ - Issue Tracking, Patch, Third Party Advisory | |
References | () https://source.android.com/security/bulletin/2017-12-01 - Third Party Advisory | |
References | () https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1408967.html - Third Party Advisory |
21 Jun 2023, 15:57
Type | Values Removed | Values Added |
---|---|---|
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:2669 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:2869 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:2770 - Third Party Advisory | |
References | (CONFIRM) https://source.android.com/security/bulletin/2017-12-01 - Third Party Advisory | |
References | (DEBIAN) http://www.debian.org/security/2017/dsa-3927 - Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2019/06/28/1 - Mailing List, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2019/06/28/2 - Mailing List, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:2585 - Third Party Advisory | |
References | (DEBIAN) http://www.debian.org/security/2017/dsa-3945 - Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2019/06/27/7 - Mailing List, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:2473 - Third Party Advisory | |
References | (MISC) https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1408967.html - Third Party Advisory |
Information
Published : 2017-08-05 16:29
Updated : 2024-11-21 03:32
NVD link : CVE-2017-7533
Mitre link : CVE-2017-7533
CVE.ORG link : CVE-2017-7533
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')