#VU7253 Use-after-free error in Linux kernel - CVE-2017-7374
Published: June 29, 2017 / Updated: July 3, 2017
Vulnerability identifier: #VU7253
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-7374
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local attacker to cause DoS condition on the target system.
The weakness exists due to use-after-free error in fs/crypto/. A local attacker can use keyring keys for ext4, f2fs, or ubifs encryption,
trigger NULL pointer derefence and cause the system to crash.
Successful exploitation of the vulnerability results in denial of service.
The weakness exists due to use-after-free error in fs/crypto/. A local attacker can use keyring keys for ext4, f2fs, or ubifs encryption,
trigger NULL pointer derefence and cause the system to crash.
Successful exploitation of the vulnerability results in denial of service.
Remediation
Update to version 4.10.7.