Use-after-free error in Linux kernel - CVE-2017-2584
Published: January 20, 2017 / Updated: June 30, 2017
Vulnerability identifier: #VU5182
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-2584
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel
Linux kernel
Detailed vulnerability description
The vulnerability allows a local attacker to cause DoS condition or obtain potentially sensitive information.
The weakness exists due to use-after-free error in the arch/x86/kvm/emulate.c script. A local attacker can use a specially crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt and cause the system to crash or read arbitrary file on the system.
Successful exploitation of the vulnerability results in denial of service.
The weakness exists due to use-after-free error in the arch/x86/kvm/emulate.c script. A local attacker can use a specially crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt and cause the system to crash or read arbitrary file on the system.
Successful exploitation of the vulnerability results in denial of service.
How to mitigate CVE-2017-2584
Update to version 4.9.5.