5.5
CVSSv3

CVE-2017-6353

Published: 01/03/2017 Updated: 04/11/2017
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 436
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

net/sctp/socket.c in the Linux kernel up to and including 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or have other impacts CVE-2016-9588 Jim Mattson discovered that the KVM implementation for Intel x86 processors does not properly handle #BP and #OF exceptions in an L2 (nested) virtual machine A local attacker ...
Possible double free in stcp_sendmsg() (incorrect fix for CVE-2017-5986): It was found that the code in net/sctp/socketc in the Linux kernel through 4101 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded ...
It was found that the code in net/sctp/socketc in the Linux kernel through 4101 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application This vulnerability was introduced by CVE-2017-5986 fix (comm ...

Github Repositories

Manages kernel packages and other kernel related config files.

Puppet kernel Manages kernel packages and other kernel related config files Requirements Ubuntu 1404 and later Usage To keep the kernel packages up to date: class { 'kernel': package_ensure => 'latest', } To blacklist the dccp module: kernel::modprobe::blacklist { 'dccp': comment =&