CVE-2017-6353

MEDIUM

Linux Kernel < 4.10 - Double Free

Title source: rule
STIX 2.1

Description

net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/96473
Mailing List, Patch, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2017/02/27/2
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2017/dsa-3804

Scores

CVSS v3 5.5
EPSS 0.0005
EPSS Percentile 13.9%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-415
Status published
Products (1)
linux/linux_kernel < 4.10
Published Mar 01, 2017
Tracked Since Feb 18, 2026