Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2017-10661 — Use After Free in Kernel
Severity
7.0HIGHNVD
EPSS
30.0%
top 3.34%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedAug 19
Latest updateMay 14
Description
Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing.
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9
Affected Packages2 packages
Also affects: Debian Linux 8.0, 9.0, Enterprise Linux 7.0, 7.4, 7.5
Patches
🔴Vulnerability Details
4💥Exploits & PoCs
1📋Vendor Advisories
5Debian▶
CVE-2017-10661: linux - Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local u...↗2017
💬Community
1Bugzilla▶
CVE-2017-10661 kernel: Handling of might_cancel queueing is not properly pretected against race↗2017-08-14