The initnewcontext function in arch/x86/include/asm/mmucontext.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIGMODIFYLDTSYSCALL=y.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-17053.json"
[
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"248508947059225701473472963862605852058",
"216804870636339054671981874495582312294",
"19441905589798514031427128322758959571",
"303513407678078049299511302874738067257",
"213121388505367170382533714063587083490"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2017-17053-8b3f4448",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@ccd5b3235180eef3cfec337df1c8554ab151b5cc",
"target": {
"file": "arch/x86/include/asm/mmu_context.h"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"length": 296.0,
"function_hash": "268810231373530720916521831851833909257"
},
"signature_type": "Function",
"id": "CVE-2017-17053-b132855f",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@ccd5b3235180eef3cfec337df1c8554ab151b5cc",
"target": {
"function": "init_new_context",
"file": "arch/x86/include/asm/mmu_context.h"
}
}
]