CVE-2017-17053

Published: Nov 29, 2017 Last Modified: Apr 20, 2025 EU-VD ID: EUVD-2017-8221 Aliases: GSD-2017-17053
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,0
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
MEDIUM 6,9
Access Vector: local
Access Complexity: medium
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete

Description

AI Translation Available

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0011
Percentile
0,3th
Updated

EPSS Score Trend (Last 90 Days)

416

Use After Free

Stable
Common Consequences
Security Scopes Affected:
Integrity Availability Confidentiality
Potential Impacts:
Modify Memory Dos: Crash, Exit, Or Restart Execute Unauthorized Code Or Commands
Applicable Platforms
Languages: C, C++, Memory-Unsafe
View CWE Details
Operating System

Linux Kernel by Linux

Version Range Affected
From 4.10 (inclusive)
To 4.12.10 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 4.4.144 (inclusive)
To 4.4.153 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Linux Kernel by Linux

Version Range Affected
From 4.6 (inclusive)
To 4.9.46 (exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccd5b…
https://access.redhat.com/errata/RHSA-2018:0676
https://github.com/torvalds/linux/commit/ccd5b3235180eef3cfec337df1c8554ab151b5…
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
http://www.securityfocus.com/bid/102010
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/102010
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccd5b…
https://access.redhat.com/errata/RHSA-2018:0676
https://github.com/torvalds/linux/commit/ccd5b3235180eef3cfec337df1c8554ab151b5…
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
http://www.securityfocus.com/bid/102010
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/102010