CVE-2017-10661

Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e38da300e1e395a15048b0af1e5305bd91402f6 Issue Tracking Patch Third Party Advisory
http://www.debian.org/security/2017/dsa-3981 Mailing List Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.15 Release Notes Vendor Advisory
http://www.securityfocus.com/bid/100215 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:3083 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3096 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:4057 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:4058 Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0036 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1481136 Issue Tracking
https://github.com/torvalds/linux/commit/1e38da300e1e395a15048b0af1e5305bd91402f6 Issue Tracking Patch Third Party Advisory
https://source.android.com/security/bulletin/2017-08-01 Patch Vendor Advisory
https://www.exploit-db.com/exploits/43345/ Third Party Advisory VDB Entry
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e38da300e1e395a15048b0af1e5305bd91402f6 Issue Tracking Patch Third Party Advisory
http://www.debian.org/security/2017/dsa-3981 Mailing List Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.15 Release Notes Vendor Advisory
http://www.securityfocus.com/bid/100215 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:3083 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3096 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:4057 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:4058 Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0036 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1481136 Issue Tracking
https://github.com/torvalds/linux/commit/1e38da300e1e395a15048b0af1e5305bd91402f6 Issue Tracking Patch Third Party Advisory
https://source.android.com/security/bulletin/2017-08-01 Patch Vendor Advisory
https://www.exploit-db.com/exploits/43345/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-08-19 18:29

Updated : 2025-04-20 01:37


NVD link : CVE-2017-10661

Mitre link : CVE-2017-10661

CVE.ORG link : CVE-2017-10661


JSON object : View

Products Affected

redhat

  • enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
  • enterprise_linux
  • enterprise_linux_aus
  • enterprise_linux_server_eus

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-416

Use After Free