CVE-2017-15649 PUBLISHED

net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346.

EPSS 0.39% · 60.0th percentile

Risk Scores

EPSS Score
0.39%
60.0th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSlinux-aws0, 4.4.0-1002.2
Ubuntu:14.04:LTSlinux-lts-xenial4.4.0-31.50~14.04.1, 4.4.0-72.93~14.04.1, 4.4.0-75.96~14.04.1
Ubuntu:16.04:LTSlinux-kvm4.4.0-1007.12, 0, 4.4.0-1004.9
Ubuntu:20.04:LTSlinux-raspi25.3.0-1014.16, 5.3.0-1007.8, 0
Ubuntu:22.04:LTSlinux-intel-iot-realtime0, 5.15.0-1073.75
Ubuntu:16.04:LTSlinux-snapdragon4.4.0-1044.48, 4.4.0-1078.83, 4.4.0-1077.82
Ubuntu:16.04:LTSlinux-raspi24.4.0-1010.12, 4.4.0-1009.10, 4.4.0-1004.5
Ubuntu:20.04:LTSlinux-gke5.4.0-1042.44, 5.4.0-1105.112, 5.4.0-1104.111
Ubuntu:16.04:LTSlinux-gcp4.10.0-1004.4, 0, 4.10.0-1009.9
Ubuntu:16.04:LTSlinux-aws4.4.0-1031.40, 4.4.0-1030.39, 4.4.0-1028.37
Ubuntu:16.04:LTSlinux-azure4.11.0-1009.9, 0, 4.11.0-1011.11
Ubuntu:24.04:LTSlinux-raspi-realtime0, 6.8.0-2019.20
Ubuntu:16.04:LTSlinux4.4.0-65.86, 4.4.0-66.87, 4.4.0-67.88
Ubuntu:16.04:LTSlinux-gke4.4.0-1013.13, 4.4.0-1014.14, 4.4.0-1016.16
Ubuntu:14.04:LTSlinux3.13.0-27.50, 0, 3.13.0-92.139
Ubuntu:20.04:LTSlinux-azure-fde5.4.0-1095.101+cvm1.1, 5.4.0-1092.97+cvm1.1, 5.4.0-1091.96+cvm1.1
Ubuntu:16.04:LTSlinux-hwe4.8.0-42.45~16.04.1, 4.8.0-53.56~16.04.1, 4.8.0-54.57~16.04.1
Ubuntu:22.04:LTSlinux-realtime0, 5.15.0-1032.35
Ubuntu:22.04:LTSlinux-riscv5.13.0-1004.4, 5.15.0-1006.6, 5.15.0-1007.7
Ubuntu:20.04:LTSlinux-riscv5.4.0-40.45, 5.4.0-31.35, 5.4.0-33.37

Timeline

References

Open in Interactive Console →