CVE-2017-7472
Linux Kernel < 4.10.13 - 'keyctl_set_reqkey_keyring' Local Denial of Service
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls.
El subsistema KEYS en el kernel de Linux anterior a 4.10.13 permite a los usuarios locales causar una denegación de servicio (consumo de memoria) a través de una serie de llamadas KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring.
A vulnerability was found in the Linux kernel where the keyctl_set_reqkey_keyring() function leaks the thread keyring. This allows an unprivileged local user to exhaust kernel memory and thus cause a DoS.
The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions. There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-04-05 CVE Reserved
- 2017-05-11 CVE Published
- 2017-06-08 First Exploit
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-400: Uncontrolled Resource Consumption
- CWE-404: Improper Resource Shutdown or Release
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/98422 | Vdb Entry | |
http://www.securitytracker.com/id/1038471 | Vdb Entry | |
https://lkml.org/lkml/2017/4/1/235 | Broken Link | |
https://lkml.org/lkml/2017/4/3/724 | Broken Link |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/142871 | 2017-06-08 | |
https://www.exploit-db.com/exploits/42136 | 2024-08-05 | |
https://github.com/homjxi0e/CVE-2017-7472 | 2017-06-08 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html | 2023-02-12 | |
https://access.redhat.com/errata/RHSA-2018:0151 | 2023-02-12 | |
https://access.redhat.com/errata/RHSA-2018:0152 | 2023-02-12 | |
https://access.redhat.com/errata/RHSA-2018:0181 | 2023-02-12 | |
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.13 | 2023-02-12 | |
https://access.redhat.com/security/cve/CVE-2017-7472 | 2018-01-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 4.10.12 Search vendor "Linux" for product "Linux Kernel" and version " <= 4.10.12" | - |
Affected
|