Linux Kernel re-exploitation of Memory Corruption Vulnerability after local release (CVE-2017-15129)
Linux Kernel re-exploitation of Memory Corruption Vulnerability after local release (CVE-2017-15129)
Release date:
Updated on:
Affected Systems:
Linux kernel <4.14.11
Description:
Bugtraq id: 102485
CVE (CAN) ID: CVE-2017-15129
Linux Kernel is the Kernel of the Linux operating system.
In versions earlier than Linux kernel 4.14.11, the network namespace Code has the re-exploitation vulnerability after release. Successful exploitation can cause memory corruption.
<* Source: Kirill Tkhai
*>
Suggestion:
Vendor patch:
Linux
-----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Https://marc.info /? T = 151370468900001 & r = 1 & w = 2
Https://marc.info /? L = linux-netdev & m = 151370451121029 & w = 2
Https://bugzilla.redhat.com/show_bug.cgi? Id = 1531174
Https://access.redhat.com/security/cve/CVE-2017-15129
Https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
Http://www.linux.org/
Https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit? Id = 21b5944350052d2583e82dd59b19a9ba94a007f0