CVE-2017-10661

Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

14 Mar 2024, 19:59

Type Values Removed Values Added
References (REDHAT) https://access.redhat.com/errata/RHSA-2018:3096 - (REDHAT) https://access.redhat.com/errata/RHSA-2018:3096 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2018:3083 - (REDHAT) https://access.redhat.com/errata/RHSA-2018:3083 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:4057 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:4057 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:4058 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:4058 - Third Party Advisory
References (DEBIAN) http://www.debian.org/security/2017/dsa-3981 - (DEBIAN) http://www.debian.org/security/2017/dsa-3981 - Mailing List, Third Party Advisory
References (EXPLOIT-DB) https://www.exploit-db.com/exploits/43345/ - (EXPLOIT-DB) https://www.exploit-db.com/exploits/43345/ - Third Party Advisory, VDB Entry
References (REDHAT) https://access.redhat.com/errata/RHSA-2020:0036 - (REDHAT) https://access.redhat.com/errata/RHSA-2020:0036 - Third Party Advisory
CPE cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
First Time Redhat enterprise Linux Server Eus
Debian
Redhat enterprise Linux Aus
Debian debian Linux
Redhat enterprise Linux Server For Power Little Endian Update Services For Sap Solutions
Redhat enterprise Linux
Redhat

Information

Published : 2017-08-19 18:29

Updated : 2024-03-14 19:59


NVD link : CVE-2017-10661

Mitre link : CVE-2017-10661


JSON object : View

Products Affected

debian

  • debian_linux

redhat

  • enterprise_linux_server_eus
  • enterprise_linux_aus
  • enterprise_linux
  • enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions

linux

  • linux_kernel
CWE
CWE-416

Use After Free