Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-17053

Опубликовано: 29 нояб. 2017
Источник: nvd
CVSS3: 7
CVSS2: 6.9
EPSS Низкий

Описание

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Версия от 4.4.144 (включая) до 4.4.153 (исключая)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Версия от 4.6 (включая) до 4.9.46 (исключая)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Версия от 4.10 (включая) до 4.12.10 (исключая)

EPSS

Процентиль: 29%
0.00108
Низкий

7 High

CVSS3

6.9 Medium

CVSS2

Дефекты

CWE-416

Связанные уязвимости

CVSS3: 7
ubuntu
около 8 лет назад

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

CVSS3: 7
redhat
больше 8 лет назад

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

CVSS3: 7
debian
около 8 лет назад

The init_new_context function in arch/x86/include/asm/mmu_context.h in ...

CVSS3: 7
github
больше 3 лет назад

The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.

suse-cvrf
больше 7 лет назад

Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)

EPSS

Процентиль: 29%
0.00108
Низкий

7 High

CVSS3

6.9 Medium

CVSS2

Дефекты

CWE-416