Use-after-free error in Linux kernel - CVE-2017-7374
Published: June 29, 2017 / Updated: July 3, 2017
Vulnerability identifier: #VU7253
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-7374
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel
Linux kernel
Detailed vulnerability description
The vulnerability allows a local attacker to cause DoS condition on the target system.
The weakness exists due to use-after-free error in fs/crypto/. A local attacker can use keyring keys for ext4, f2fs, or ubifs encryption,
trigger NULL pointer derefence and cause the system to crash.
Successful exploitation of the vulnerability results in denial of service.
The weakness exists due to use-after-free error in fs/crypto/. A local attacker can use keyring keys for ext4, f2fs, or ubifs encryption,
trigger NULL pointer derefence and cause the system to crash.
Successful exploitation of the vulnerability results in denial of service.
How to mitigate CVE-2017-7374
Update to version 4.10.7.