Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-6353

Опубликовано: 01 мар. 2017
Источник: debian
EPSS Низкий

Описание

net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.9.13-1package

Примечания

  • https://marc.info/?l=linux-netdev&m=148785309416337&w=2

EPSS

Процентиль: 14%
0.00046
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 9 лет назад

net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.

CVSS3: 5.5
redhat
почти 9 лет назад

net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.

CVSS3: 5.5
nvd
почти 9 лет назад

net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.

CVSS3: 5.5
github
больше 3 лет назад

net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.

suse-cvrf
почти 9 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 14%
0.00046
Низкий