Use-after-free vulnerability in fs/crypto/ in the Linux kernel before 4.10.7 allows local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely.
References
Link | Resource |
---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1b53cf9815bb4744958d41f3795d5d5a1d365e2d | Patch Third Party Advisory |
http://www.securityfocus.com/bid/97308 | Third Party Advisory VDB Entry |
https://github.com/torvalds/linux/commit/1b53cf9815bb4744958d41f3795d5d5a1d365e2d | Patch Third Party Advisory |
https://source.android.com/security/bulletin/2017-10-01 | Third Party Advisory |
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.7 | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-03-31 20:59
Updated : 2024-02-28 15:44
NVD link : CVE-2017-7374
Mitre link : CVE-2017-7374
CVE.ORG link : CVE-2017-7374
JSON object : View
Products Affected
linux
- linux_kernel