Race condition in kernel/ucount.c in the Linux kernel through 4.10.2 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls that leverage certain decrement behavior that causes incorrect interaction between put_ucounts and get_ucounts.
References
| Link | Resource |
|---|---|
| http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=040757f738e13caaa9c5078bca79aa97e11dde88 | Issue Tracking Patch Third Party Advisory |
| http://www.securityfocus.com/bid/96856 | Third Party Advisory VDB Entry |
| https://github.com/torvalds/linux/commit/040757f738e13caaa9c5078bca79aa97e11dde88 | Issue Tracking Patch Third Party Advisory |
| http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=040757f738e13caaa9c5078bca79aa97e11dde88 | Issue Tracking Patch Third Party Advisory |
| http://www.securityfocus.com/bid/96856 | Third Party Advisory VDB Entry |
| https://github.com/torvalds/linux/commit/040757f738e13caaa9c5078bca79aa97e11dde88 | Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-03-14 09:59
Updated : 2025-04-20 01:37
NVD link : CVE-2017-6874
Mitre link : CVE-2017-6874
CVE.ORG link : CVE-2017-6874
JSON object : View
Products Affected
linux
- linux_kernel
