CVE-2017-15649
Description
net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A race condition in the Linux kernel's packet fanout implementation (before 4.13.6) allows local users to gain privileges via a use-after-free bug.
Vulnerability
CVE-2017-15649 is a race condition vulnerability in the Linux kernel's net/packet/af_packet.c file, specifically in the fanout_add and packet_do_bind functions. The bug affects kernels before version 4.13.6 [1][4]. It involves mishandling of packet_fanout data structures and is distinct from CVE-2017-6346.
Exploitation
An attacker with local access to the system can trigger the vulnerability by crafting a sequence of system calls that exploits a race window between fanout_add and packet_do_bind. This race condition leads to a use-after-free scenario [1][3][4]. No special privileges beyond local user access are required.
Impact
Successful exploitation allows an attacker to escalate privileges on the affected system. The impact can range from denial of service (system crash) to arbitrary code execution with elevated privileges [1][3][4]. Confidentiality, integrity, and availability of the system may be compromised.
Mitigation
Red Hat released updated kernel packages (kernel-3.10.0-693.17.1.el7) in RHSA-2018:0151 and RHSA-2018:0152 for Red Hat Enterprise Linux 7 [1][2]. An updated kernel-rt package was provided in RHSA-2018:0181 for Red Hat MRG [4]. Ubuntu published kernel updates in USN-3754-1 [3]. Users should apply the latest updates for their distribution. The upstream fix is included in Linux kernel version 4.13.6 and later.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
113- osv-coords112 versionspkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-xen&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_10&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_10&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_11&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_11&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_12&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_12&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_13&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_13&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_14&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_14&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_18&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_18&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_19&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_19&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_20&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_20&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_21&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_21&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_22&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_22&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_22&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_9&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_9&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_10&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_11&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_12&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_13&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_14&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_3&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_4&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_7&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_8&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_9&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_3&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_4&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_18&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_19&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_20&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_21&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_22&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_23&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_24&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_25&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_26&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_27&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_28&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_29&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_30&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_31&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_32&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS
< 4.4.90-92.45.1+ 111 more
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 3.12.61-52.101.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.3
- (no CPE)range: < 4.4.92-6.18.3
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.95-21.1
- (no CPE)range: < 4.4.95-21.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 3.12.61-52.101.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.95-21.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 3.12.61-52.101.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 4.4.95-21.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.12.61-52.101.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 3.12.74-60.64.63.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 10-2.1
- (no CPE)range: < 10-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 8-2.1
- (no CPE)range: < 8-2.1
- (no CPE)range: < 7-2.1
- (no CPE)range: < 7-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 3-2.1
- (no CPE)range: < 3-2.1
- (no CPE)range: < 1-2.1
- (no CPE)range: < 1-2.1
- (no CPE)range: < 1-2.1
- (no CPE)range: < 12-2.1
- (no CPE)range: < 12-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 3-2.1
- (no CPE)range: < 1-2.4
- (no CPE)range: < 10-2.1
- (no CPE)range: < 10-2.1
- (no CPE)range: < 10-2.1
- (no CPE)range: < 8-2.1
- (no CPE)range: < 7-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 3-2.1
- (no CPE)range: < 2-2.1
- (no CPE)range: < 2-2.1
- (no CPE)range: < 1-4.3
- (no CPE)range: < 10-2.1
- (no CPE)range: < 10-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 7-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 3-2.1
- (no CPE)range: < 1-8.1
- (no CPE)range: < 2-2.1
- (no CPE)range: < 2-2.1
- (no CPE)range: < 2-2.1
- (no CPE)range: < 2-2.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110nvdPatchThird Party Advisory
- github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69envdPatchThird Party Advisory
- www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6nvdExploitThird Party Advisory
- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdThird Party Advisory
- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdThird Party Advisory
- patchwork.ozlabs.org/patch/813945/nvdIssue TrackingThird Party Advisory
- patchwork.ozlabs.org/patch/818726/nvdThird Party Advisory
- www.securityfocus.com/bid/101573nvdThird Party AdvisoryVDB Entry
- blogs.securiteam.com/index.php/archives/3484nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2018:0151nvd
- access.redhat.com/errata/RHSA-2018:0152nvd
- access.redhat.com/errata/RHSA-2018:0181nvd
- lists.debian.org/debian-lts-announce/2017/12/msg00004.htmlnvd
- usn.ubuntu.com/3754-1/nvd
News mentions
0No linked articles in our index yet.