net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.
References
Link | Resource |
---|---|
https://github.com/torvalds/linux/commit/dfcb9f4f99f1e9a49e43398a7bfbf56927544af1 | Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/02/27/2 | Mailing List Patch Third Party Advisory |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dfcb9f4f99f1e9a49e43398a7bfbf56927544af1 | Patch Third Party Advisory |
http://www.securityfocus.com/bid/96473 | |
http://www.debian.org/security/2017/dsa-3804 |
Configurations
Information
Published : 2017-03-01 12:59
Updated : 2017-11-03 18:29
NVD link : CVE-2017-6353
Mitre link : CVE-2017-6353
JSON object : View
CWE
CWE-415
Double Free
Products Affected
linux
- linux_kernel