Public Date:
1468283: CVE-2017-7533 kernel: a race between inotify_handle_event() and sys_rename()
A race condition was found in the Linux kernel, present since v3.14-rc1 through v4.12. The race happens between threads of inotify_handle_event() and vfs_rename() while running the rename operation against the same file. As a result of the race the next slab data or the slab's free list pointer can be corrupted with attacker-controlled data, which may lead to the privilege escalation.

Find out more about CVE-2017-7533 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7.0 and 7.1 as the code with the flaw is not present in the products listed.

This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7.2 and newer and Red Hat Enterprise MRG 2. Future kernel updates for these products may address this issue.

CVSS v3 metrics

CVSS3 Base Score 7.8
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector Local
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2017:2669 2017-09-06
Red Hat Enterprise Linux Extended Update Support 7.3 (kernel) RHSA-2017:2770 2017-09-19
Red Hat Enterprise Linux for Real Time for NFV (v. 7) (kernel-rt) RHSA-2017:2585 2017-09-05
Red Hat Enterprise Linux Extended Update Support 7.2 (kernel) RHSA-2017:2869 2017-10-10
Red Hat Enterprise Linux 7 (kernel) RHSA-2017:2473 2017-08-15

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 kernel-alt Affected
Red Hat Enterprise Linux 6 kernel Not affected
Red Hat Enterprise Linux 5 kernel Not affected
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.


Red Hat would like to thank Leilei Lin (Alibaba Group), Fan Wu (The University of Hong Kong), Shixiong Zhao (The University of Hong Kong), Shankara Pailoor (Columbia University), and Andrew Aday (Columbia University) for reporting this issue.
Last Modified