SB2017120204 - Use-after-free in Linux Kernel
Published: December 2, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2017-17053)
The vulnerability allows a local user to execute arbitrary code on the target system with elevated privileges.
The vulnerability exists due to use-after-free error within the init_new_context() function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 when handling errors in LDT table allocation during forking of a new process. A local user can execute a specially crafted application and execute arbitrary code on the system with escalated privileges.
This vulnerability only affected kernels built with "CONFIG_MODIFY_LDT_SYSCALL" set to "Y".
Remediation
Install update from vendor's website.