{"id":"CVE-2017-10661","details":"Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing.","modified":"2026-03-15T22:13:35.808548Z","published":"2017-08-19T18:29:00.257Z","related":["SUSE-SU-2017:2525-1","SUSE-SU-2017:2694-1","SUSE-SU-2017:2908-1","SUSE-SU-2017:2920-1","SUSE-SU-2017:3265-1","SUSE-SU-2017:3286-1","SUSE-SU-2017:3287-1","SUSE-SU-2017:3288-1","SUSE-SU-2017:3289-1","SUSE-SU-2017:3290-1","SUSE-SU-2017:3291-1","SUSE-SU-2017:3292-1","SUSE-SU-2017:3293-1","SUSE-SU-2017:3296-1","SUSE-SU-2017:3299-1","SUSE-SU-2017:3301-1","SUSE-SU-2017:3302-1","SUSE-SU-2017:3303-1","SUSE-SU-2017:3304-1","SUSE-SU-2017:3305-1","SUSE-SU-2017:3306-1","SUSE-SU-2017:3308-1","SUSE-SU-2017:3309-1","SUSE-SU-2017:3310-1","SUSE-SU-2017:3312-1","SUSE-SU-2017:3313-1","SUSE-SU-2017:3316-1","SUSE-SU-2017:3318-1","SUSE-SU-2017:3320-1","SUSE-SU-2017:3321-1","SUSE-SU-2017:3322-1","SUSE-SU-2017:3323-1","SUSE-SU-2017:3332-1","SUSE-SU-2017:3336-1","SUSE-SU-2017:3337-1","SUSE-SU-2017:3340-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3981"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/100215"},{"type":"ADVISORY","url":"https://www.exploit-db.com/exploits/43345/"},{"type":"ADVISORY","url":"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.15"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3083"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3096"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:4057"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:4058"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0036"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1481136"},{"type":"FIX","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e38da300e1e395a15048b0af1e5305bd91402f6"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/1e38da300e1e395a15048b0af1e5305bd91402f6"},{"type":"FIX","url":"https://source.android.com/security/bulletin/2017-08-01"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-10661.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.92"}]},{"events":[{"introduced":"3.3"},{"fixed":"3.16.47"}]},{"events":[{"introduced":"3.17"},{"fixed":"3.18.52"}]},{"events":[{"introduced":"3.19"},{"fixed":"4.1.41"}]},{"events":[{"introduced":"4.2"},{"fixed":"4.4.67"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.27"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.10.15"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}