CVE-2017-17053
HIGH
7,0
Source: [email protected]
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
MEDIUM
6,9
Source: [email protected]
Access Vector: local
Access Complexity: medium
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete
Description
AI Translation Available
The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0011
Percentile
0,3th
Updated
EPSS Score Trend (Last 90 Days)
416
Use After Free
StableCommon Consequences
Security Scopes Affected:
Integrity
Availability
Confidentiality
Potential Impacts:
Modify Memory
Dos: Crash, Exit, Or Restart
Execute Unauthorized Code Or Commands
Applicable Platforms
Languages:
C, C++, Memory-Unsafe
Operating System
Linux Kernel by Linux
Version Range Affected
From
4.10
(inclusive)
To
4.12.10
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Linux Kernel by Linux
Version Range Affected
From
4.4.144
(inclusive)
To
4.4.153
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Linux Kernel by Linux
Version Range Affected
From
4.6
(inclusive)
To
4.9.46
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccd5b…
https://access.redhat.com/errata/RHSA-2018:0676
https://github.com/torvalds/linux/commit/ccd5b3235180eef3cfec337df1c8554ab151b5…
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
http://www.securityfocus.com/bid/102010
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccd5b…
https://access.redhat.com/errata/RHSA-2018:0676
https://github.com/torvalds/linux/commit/ccd5b3235180eef3cfec337df1c8554ab151b5…
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
http://www.securityfocus.com/bid/102010