Use After Free Affecting torvalds/linux package, versions [,4.14.11)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use After Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-TORVALDSLINUX-3004930
  • published26 Jan 2022
  • disclosed9 Jan 2018
  • creditUnknown

Introduced: 9 Jan 2018

CVE-2017-15129  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

Upgrade torvalds/linux to version 4.14.11 or higher.

Overview

Affected versions of this package are vulnerable to Use After Free. A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.

CVSS Scores

version 3.1