7.8
CVSSv3

CVE-2017-7374

Published: 31/03/2017 Updated: 14/02/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Use-after-free vulnerability in fs/crypto/ in the Linux kernel prior to 4.10.7 allows local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the kernel ...
A use-after-free flaw was found in the Linux kernel's file system encryption implementation A local user could revoke keyring keys being used for ext4, f2fs, or ubifs encryption, causing a denial of service on the system ...
Use-after-free vulnerability in fs/crypto/ in the Linux kernel before 4107 allows local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely ...

Github Repositories

cve-2017-7374 To trigger the vulnerability, we need a ext4 file system with encryption support and create a encrypted directory

Recent Articles

Patch your Android, peeps, it has up to 14 nasty flaws to flog
The Register • Iain Thomson in San Francisco • 03 Oct 2017

There's a nasty bug in media file handling – deja vu, right?

Another month, another round of Android patches – although October's batch is pleasantly small compared to other recent releases. Of the 14 CVE flaws released, six cover Android's troubled media processing and playback engine. This means miscreants can fling malicious files at devices to potentially hijack them. The privilege escalation bugs can be used by dodgy apps to gain control of handsets and tablets. There's also a remote-code execution flaw in the Dnsmasq tool used by Android. Details ...