7
CVSSv3

CVE-2017-17053

Published: 29/11/2017 Updated: 21/06/2023
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel prior to 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local malicious user to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Synopsis Important: kernel-rt security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Sco ...
The init_new_context function in arch/x86/include/asm/mmu_contexth in the Linux kernel, before 41210, does not correctly handle errors from LDT table allocation when forking a new process This could allow a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program ...

Github Repositories

커널 분석

kernel-analysis 커널 분석 kernel 240 CVE-2017-17053 CVE Details Patch Code Blog