cvelist/2017/15xxx/CVE-2017-15126.json

99 lines
3.8 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2023-02-02 15:01:13 +00:00
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
2019-03-18 02:34:13 +00:00
"CVE_data_meta": {
"ID": "CVE-2017-15126",
2023-02-02 15:01:13 +00:00
"ASSIGNER": "secalert@redhat.com",
2019-03-18 02:34:13 +00:00
"STATE": "PUBLIC"
},
2023-02-02 15:01:13 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2023-02-12 23:01:42 +00:00
"value": "A use-after-free flaw was found in fs/userfaultfd.c in the Linux kernel before 4.13.6. The issue is related to the handling of fork failure when dealing with event messages. Failure to fork correctly can lead to a situation where a fork event will be removed from an already freed list of events with userfaultfd_ctx_put()."
2023-02-02 15:01:13 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
2023-02-12 23:01:42 +00:00
"value": "CWE-119",
2023-02-02 15:01:13 +00:00
"cweId": "CWE-119"
}
]
}
]
},
2019-03-18 02:34:13 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
2023-02-12 23:01:42 +00:00
"vendor_name": "n/a",
2019-03-18 02:34:13 +00:00
"product": {
"product_data": [
{
2023-02-12 23:01:42 +00:00
"product_name": "Linux Kernel before 4.13.6",
2019-03-18 02:34:13 +00:00
"version": {
"version_data": [
{
2023-02-12 23:01:42 +00:00
"version_affected": "=",
"version_value": "Linux Kernel before 4.13.6"
2019-03-18 02:34:13 +00:00
}
]
}
}
]
2023-02-02 15:01:13 +00:00
}
2019-03-18 02:34:13 +00:00
}
]
}
},
"references": {
"reference_data": [
{
2023-02-02 15:01:13 +00:00
"url": "https://access.redhat.com/errata/RHSA-2018:0676",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2018:0676"
2019-03-18 02:34:13 +00:00
},
{
2023-02-02 15:01:13 +00:00
"url": "https://access.redhat.com/errata/RHSA-2018:1062",
2019-03-18 02:34:13 +00:00
"refsource": "MISC",
2023-02-02 15:01:13 +00:00
"name": "https://access.redhat.com/errata/RHSA-2018:1062"
2019-03-18 02:34:13 +00:00
},
{
2023-02-02 15:01:13 +00:00
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=384632e67e0829deb8015ee6ad916b180049d252",
2019-03-18 02:34:13 +00:00
"refsource": "MISC",
2023-02-02 15:01:13 +00:00
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=384632e67e0829deb8015ee6ad916b180049d252"
2019-03-18 02:34:13 +00:00
},
{
2023-02-02 15:01:13 +00:00
"url": "http://www.securityfocus.com/bid/102516",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/102516"
2019-03-18 02:34:13 +00:00
},
{
2023-02-02 15:01:13 +00:00
"url": "https://access.redhat.com/security/cve/CVE-2017-15126",
2019-03-18 02:34:13 +00:00
"refsource": "MISC",
2023-02-02 15:01:13 +00:00
"name": "https://access.redhat.com/security/cve/CVE-2017-15126"
2019-03-18 02:34:13 +00:00
},
{
2023-02-02 15:01:13 +00:00
"url": "https://github.com/torvalds/linux/commit/384632e67e0829deb8015ee6ad916b180049d252",
2019-03-18 02:34:13 +00:00
"refsource": "MISC",
2023-02-02 15:01:13 +00:00
"name": "https://github.com/torvalds/linux/commit/384632e67e0829deb8015ee6ad916b180049d252"
2019-03-18 02:34:13 +00:00
},
{
2023-02-02 15:01:13 +00:00
"url": "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6",
2019-03-18 02:34:13 +00:00
"refsource": "MISC",
2023-02-02 15:01:13 +00:00
"name": "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6"
2023-02-12 23:01:42 +00:00
},
2023-02-02 15:01:13 +00:00
{
2023-02-12 23:01:42 +00:00
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523481",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1523481"
2019-03-18 02:34:13 +00:00
}
]
}
}