The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html - Third Party Advisory | |
References | () http://lists.openwall.net/netdev/2017/12/04/224 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2017/12/05/1 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/102056 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2018:0399 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:0676 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1062 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1130 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1170 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1216 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1319 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:3822 - Third Party Advisory | |
References | () https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html - Third Party Advisory | |
References | () https://usn.ubuntu.com/3581-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3581-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3581-3/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3582-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3582-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3583-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3583-2/ - Third Party Advisory | |
References | () https://www.debian.org/security/2017/dsa-4073 - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4082 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/43234/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2017-12-05 09:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-8824
Mitre link : CVE-2017-8824
CVE.ORG link : CVE-2017-8824
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free