Bug 1438394 (CVE-2017-7374) - CVE-2017-7374 kernel: use-after-free in keyring key revocation
Summary: CVE-2017-7374 kernel: use-after-free in keyring key revocation
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2017-7374
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1438395
TreeView+ depends on / blocked
 
Reported: 2017-04-03 10:41 UTC by Martin Prpič
Modified: 2021-02-17 02:23 UTC (History)
34 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2017-04-26 10:25:07 UTC
Embargoed:


Attachments (Terms of Use)

Description Martin Prpič 2017-04-03 10:41:06 UTC
A use-after-free flaw was found in the Linux kernel's file system encryption implementation. A local user could revoke keyring keys being used for ext4, f2fs, or ubifs encryption, causing a denial of service on the system.

Upstream patch:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1b53cf9815bb4744958d41f3795d5d5a1d365e2d

Comment 1 Justin M. Forbes 2017-04-03 12:23:14 UTC
This is fixed in Fedora with the 4.10.7 and newer stable kernel releases.

Comment 2 Vladis Dronov 2017-04-26 10:24:04 UTC
Statement:

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG-2 as the code where the flaw was found is not present in these products.


Note You need to log in before you can comment on or make changes to this bug.