4.9

CVE-2017-15129

A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 4.0 < 4.14.11
LinuxLinux Kernel Version4.15 Updaterc1
LinuxLinux Kernel Version4.15 Updaterc2
LinuxLinux Kernel Version4.15 Updaterc3
LinuxLinux Kernel Version4.15 Updaterc4
FedoraprojectFedora Version27
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionesm
CanonicalUbuntu Linux Version17.10
RedhatEnterprise Linux Version7.0
RedhatEnterprise Linux Eus Version7.4
RedhatEnterprise Linux Eus Version7.6
RedhatEnterprise Linux Eus Version7.7
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.07% 0.181
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.7 1 3.6
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 4.9 3.9 6.9
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.

https://usn.ubuntu.com/3619-1/
Third Party Advisory
https://usn.ubuntu.com/3619-2/
Third Party Advisory
https://usn.ubuntu.com/3617-1/
Third Party Advisory
https://usn.ubuntu.com/3617-2/
Third Party Advisory
https://usn.ubuntu.com/3617-3/
Third Party Advisory
https://usn.ubuntu.com/3632-1/
Third Party Advisory
http://seclists.org/oss-sec/2018/q1/7
Third Party Advisory
Mailing List
https://bugzilla.redhat.com/show_bug.cgi?id=1531174
Patch
Third Party Advisory
Issue Tracking
https://marc.info/?l=linux-netdev&m=151370451121029&w=2
Patch
Third Party Advisory
Mailing List
https://marc.info/?t=151370468900001&r=1&w=2
Third Party Advisory
Mailing List