{"id":"CVE-2017-15649","details":"net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346.","modified":"2026-03-15T22:15:13.277069Z","published":"2017-10-19T22:29:00.433Z","related":["SUSE-SU-2017:2847-1","SUSE-SU-2017:2869-1","SUSE-SU-2017:2908-1","SUSE-SU-2017:2920-1","SUSE-SU-2017:3072-1","SUSE-SU-2017:3074-1","SUSE-SU-2017:3076-1","SUSE-SU-2017:3103-1","SUSE-SU-2017:3116-1","SUSE-SU-2017:3117-1","SUSE-SU-2017:3118-1","SUSE-SU-2017:3119-1","SUSE-SU-2017:3120-1","SUSE-SU-2017:3121-1","SUSE-SU-2017:3122-1","SUSE-SU-2017:3123-1","SUSE-SU-2017:3124-1","SUSE-SU-2017:3125-1","SUSE-SU-2017:3126-1","SUSE-SU-2017:3127-1","SUSE-SU-2017:3128-1","SUSE-SU-2017:3129-1","SUSE-SU-2017:3130-1","SUSE-SU-2017:3131-1","SUSE-SU-2017:3132-1","SUSE-SU-2017:3134-1","SUSE-SU-2017:3136-1","SUSE-SU-2017:3139-1","SUSE-SU-2017:3145-1","SUSE-SU-2017:3146-1","SUSE-SU-2017:3147-1","SUSE-SU-2017:3148-1","SUSE-SU-2017:3149-1","SUSE-SU-2017:3150-1","SUSE-SU-2017:3151-1","SUSE-SU-2017:3152-1","SUSE-SU-2017:3153-1","SUSE-SU-2017:3154-1","SUSE-SU-2017:3156-1","SUSE-SU-2017:3157-1","SUSE-SU-2017:3158-1","SUSE-SU-2017:3159-1","SUSE-SU-2017:3160-1","SUSE-SU-2017:3267-1","SUSE-SU-2017:3307-1","SUSE-SU-2017:3315-1","SUSE-SU-2018:0233-1","SUSE-SU-2018:0562-1","SUSE-SU-2018:0664-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html"},{"type":"WEB","url":"https://usn.ubuntu.com/3754-1/"},{"type":"ADVISORY","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e"},{"type":"ADVISORY","url":"http://patchwork.ozlabs.org/patch/818726/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0151"},{"type":"ADVISORY","url":"https://blogs.securiteam.com/index.php/archives/3484"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/101573"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0152"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0181"},{"type":"ADVISORY","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2a13f2d04c947adc536d19debb8fe66f110"},{"type":"REPORT","url":"http://patchwork.ozlabs.org/patch/813945/"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69e"},{"type":"EVIDENCE","url":"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.13.5"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-15649.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}