{
  "threat_severity" : "Important",
  "public_date" : "2017-08-03T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: a race between inotify_handle_event() and sys_rename()",
    "id" : "1468283",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1468283"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.8",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-362->CWE-642",
  "details" : [ "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "A race condition was found in the Linux kernel, present since v3.14-rc1 through v4.12. The race happens between threads of inotify_handle_event() and vfs_rename() while running the rename operation against the same file. As a result of the race the next slab data or the slab's free list pointer can be corrupted with attacker-controlled data, which may lead to the privilege escalation." ],
  "statement" : "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7.0 and 7.1 as the code with the flaw is not present in the products listed.\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7.2 and newer and Red Hat Enterprise MRG 2. Future kernel updates for these products may address this issue.",
  "acknowledgement" : "Red Hat would like to thank Andrew Aday (Columbia University), Fan Wu (The University of Hong Kong), Leilei Lin (Alibaba Group), Shankara Pailoor (Columbia University), and Shixiong Zhao (The University of Hong Kong) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2017-09-05T00:00:00Z",
    "advisory" : "RHSA-2017:2585",
    "cpe" : "cpe:/a:redhat:rhel_extras_rt:7",
    "package" : "kernel-rt-0:3.10.0-693.2.1.rt56.620.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2017-08-15T00:00:00Z",
    "advisory" : "RHSA-2017:2473",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "kernel-0:3.10.0-693.1.1.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.2 Extended Update Support",
    "release_date" : "2017-10-10T00:00:00Z",
    "advisory" : "RHSA-2017:2869",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.2",
    "package" : "kernel-0:3.10.0-327.61.3.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.3 Extended Update Support",
    "release_date" : "2017-09-19T00:00:00Z",
    "advisory" : "RHSA-2017:2770",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.3",
    "package" : "kernel-0:3.10.0-514.32.2.el7"
  }, {
    "product_name" : "Red Hat Enterprise MRG 2",
    "release_date" : "2017-09-06T00:00:00Z",
    "advisory" : "RHSA-2017:2669",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:2:server:el6",
    "package" : "kernel-rt-1:3.10.0-693.2.1.rt56.585.el6rt"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Affected",
    "package_name" : "kernel-alt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2017-7533\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-7533" ],
  "name" : "CVE-2017-7533",
  "csaw" : false
}