vendor:
Linux Kernel
by:
Anonymous
7
CVSS
HIGH
Use-After-Free
416
CWE
Product Name: Linux Kernel
Affected Version From: 4.10
Affected Version To: 4.10
Patch Exists: YES
Related CWE: CVE-2017-10661
CPE: o:linux:linux_kernel
Metasploit:
https://www.rapid7.com/db/vulnerabilities/debian-cve-2017-10661/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2017-10661/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2017-10661/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2017-10661/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2017-10661/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2017-10661/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2017-10661/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2017-10661/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2017
Use-After-Free Vulnerability in Kernel 4.10
This PoC triggers a Use-After-Free (UAF) vulnerability in the Linux kernel version 4.10. The vulnerability is caused by a race condition between two threads, one that adds a timerfd and one that deletes it. The race condition can be exploited to cause a UAF, which can be used to gain arbitrary code execution.
Mitigation:
The vulnerability can be mitigated by upgrading to a newer version of the Linux kernel.