Use-after-free vulnerability in fs/crypto/ in the Linux kernel before 4.10.7 allows local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-16401 | Use-after-free vulnerability in fs/crypto/ in the Linux kernel before 4.10.7 allows local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely. |
Ubuntu USN |
USN-3265-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3265-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3342-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3342-2 | Linux kernel (HWE) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T15:56:36.459Z
Reserved: 2017-03-31T00:00:00
Link: CVE-2017-7374
No data.
Status : Deferred
Published: 2017-03-31T20:59:00.167
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-7374
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN