Описание
Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
A flaw was found in the Linux kernel's implementation of seq_file where a local attacker could manipulate memory in the put() function pointer. This could lead to memory corruption and possible privileged escalation.
Отчет
This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code which can trigger the flaw is not present in the products listed. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kernel | Not affected | ||
Red Hat Enterprise Linux 6 | kernel | Fixed | RHSA-2017:0892 | 11.04.2017 |
Red Hat Enterprise Linux 7 | kernel-rt | Fixed | RHSA-2017:1298 | 25.05.2017 |
Red Hat Enterprise Linux 7 | kernel | Fixed | RHSA-2017:1308 | 25.05.2017 |
Red Hat Enterprise MRG 2 | kernel-rt | Fixed | RHSA-2017:1297 | 25.05.2017 |
Показывать по
Дополнительная информация
Статус:
EPSS
7 High
CVSS3
6.2 Medium
CVSS2
Связанные уязвимости
Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
Use-after-free vulnerability in the disk_seqf_stop function in block/g ...
Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
ELSA-2017-3537: Unbreakable Enterprise kernel security update (IMPORTANT)
EPSS
7 High
CVSS3
6.2 Medium
CVSS2