Use-after-free error in Linux kernel - CVE-2017-7374

 

Use-after-free error in Linux kernel - CVE-2017-7374

Published: June 29, 2017 / Updated: July 3, 2017


Vulnerability identifier: #VU7253
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-7374
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists due to use-after-free error in fs/crypto/. A local attacker can use keyring keys for ext4, f2fs, or ubifs encryption, 
trigger NULL pointer derefence and cause the system to crash.

Successful exploitation of the vulnerability results in denial of service.

How to mitigate CVE-2017-7374

Update to version 4.10.7.

Sources