First published: Wed May 03 2017(Updated: )
A reference counter leak in ipxitf_ioctl function was found which results into use after free vulnerability that's triggerable from unprivileged userspace when IPX interface is configured. References: <a href="http://seclists.org/oss-sec/2017/q2/251">http://seclists.org/oss-sec/2017/q2/251</a> <a href="https://patchwork.ozlabs.org/patch/757549/">https://patchwork.ozlabs.org/patch/757549/</a> Upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee0d8d8482345ff97a75a7d747efc309f13b0d80">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee0d8d8482345ff97a75a7d747efc309f13b0d80</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <3.2.89 | |
Linux Linux kernel | >=3.3<3.16.44 | |
Linux Linux kernel | >=3.17<3.18.55 | |
Linux Linux kernel | >=3.19<4.1.41 | |
Linux Linux kernel | >=4.2<4.4.70 | |
Linux Linux kernel | >=4.5<4.9.30 | |
Linux Linux kernel | >=4.10<4.11.3 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.5-1 6.11.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-7487.
The severity level of CVE-2017-7487 is high.
CVE-2017-7487 allows local users to cause a denial of service (use-after-free) or possibly have other unspecified impact by exploiting mishandled reference counts in the ipxitf_ioctl function in net/ipx/af_ipx.c.
Linux kernel versions through 4.11.1 are affected by CVE-2017-7487.
You can find more information about CVE-2017-7487 at the following references: http://www.securitytracker.com/id/1039237, http://www.securityfocus.com/bid/98439, http://www.debian.org/security/2017/dsa-3886.