7.8
CVSSv3

CVE-2017-8890

Published: 10/05/2017 Updated: 24/02/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel up to and including 4.10.15 allows malicious users to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2017-7487 Li Qiang reported a reference counter leak in the ipxitf_ioctl function which may result into a use-after-free vulnerability, triggerable when a IPX interface is configured CVE ...
Module reference leak due to improper shut down of callback channel on umount:The NFSv4 implementation in the Linux kernel through 4111 allows local users to cause a denial of service (resource consumption) by leveraging improper channel callback shutdown when unmounting an NFSv4 filesystem, aka a "module reference and kernel daemon" leak (CVE-2 ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
The inet_csk_clone_lock function in net/ipv4/inet_connection_sockc in the Linux kernel allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call An unprivileged local user could use this flaw to induce kernel memory corruption on the system, leading to a crash ...

Github Repositories

For Metasploit pull request

Module: Phoenix Talon CVE 2017-8890 This may resolve issue #8571, which requests Phoenix Talon modules Overview of 2017-8890 This CVE: is the most serious member of the Phoenix Talon class of Linux kernel vulnerabilities No POC of this CVE exists in the Exploit DB But other public POC's are available is not very well-documented But here's a short explanation to

Fjsec LSM disabler for Fujitsu Arrows NX F-01F (Android 4.4.2, build # V10R22A, kernel version 3.4.0)

LSM Trasher This is the fjsec LSM disabler for Fujitsu Arrows NX F-01F (Android 442, build # V10R22A, kernel version 340) Supposed to be used after you gain root w/ CVE-2017-8890 exp - just insmod-rmmod it and you're done The compilation is performed against the ending KK kernel with msm8974_defconfig configuration Modulesymvers is generated with extract-symvers sc

practice

some exploits for practise cve-2015-1805 cve-2017-7184 just a practice, should use setcap tool cve-2017-2636 SMAP/SMEP bypass cve-2017-8890_v0 with nosmep, nosmap cve-2017-8890_v1 with smep, nosmap cve-2017-8890_v2 with smep, nosmap, for SLUB xfrm_poc RE challenge

CVE-2017-8890 相关文档: ubuntu 内核双机调试方法 CVE-2017-8890漏洞分析和利用-概览篇 CVE-2017-8890 漏洞分析 原理篇 CVE-2017-8890 漏洞利用(root ubuntu 1604@kernel 410) CVE-2017-8890 漏洞利用 (root nexus6p@kernel 310)