Use-after-free vulnerability in fs/crypto/ in the Linux kernel before 4.10.7 allows local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely.
References
Link | Resource |
---|---|
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.7 | Release Notes Vendor Advisory |
https://github.com/torvalds/linux/commit/1b53cf9815bb4744958d41f3795d5d5a1d365e2d | Patch Third Party Advisory |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1b53cf9815bb4744958d41f3795d5d5a1d365e2d | Patch Third Party Advisory |
http://www.securityfocus.com/bid/97308 | Third Party Advisory VDB Entry |
https://source.android.com/security/bulletin/2017-10-01 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-03-31 13:59
Updated : 2023-02-14 13:38
NVD link : CVE-2017-7374
Mitre link : CVE-2017-7374
JSON object : View
Products Affected
linux
- linux_kernel