Vulnerability Description
net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 4.13.5 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2Third Party Advisory
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=497161Third Party Advisory
- http://patchwork.ozlabs.org/patch/813945/Issue TrackingThird Party Advisory
- http://patchwork.ozlabs.org/patch/818726/Third Party Advisory
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6ExploitThird Party Advisory
- http://www.securityfocus.com/bid/101573Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:0151
- https://access.redhat.com/errata/RHSA-2018:0152
- https://access.redhat.com/errata/RHSA-2018:0181
- https://blogs.securiteam.com/index.php/archives/3484Third Party Advisory
- https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f11PatchThird Party Advisory
- https://github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3754-1/
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2Third Party Advisory
FAQ
What is CVE-2017-15649?
CVE-2017-15649 is a vulnerability with a CVSS score of 7.8 (HIGH). net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race con...
How severe is CVE-2017-15649?
CVE-2017-15649 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-15649?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.