9.3
HIGH CVSS 2.0
CVE-2017-15126
Linux Kernel Userfaultfd Use-After-Free Vulnerability
Description

A use-after-free flaw was found in fs/userfaultfd.c in the Linux kernel before 4.13.6. The issue is related to the handling of fork failure when dealing with event messages. Failure to fork correctly can lead to a situation where a fork event will be removed from an already freed list of events with userfaultfd_ctx_put().

INFO

Published Date :

Jan. 14, 2018, 6:29 a.m.

Last Modified :

Nov. 21, 2024, 3:14 a.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2017-15126 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 2.0 HIGH [email protected]
CVSS 3.1 HIGH [email protected]
Solution
The Linux kernel is vulnerable to a use-after-free flaw, and should be updated.
  • Update the Linux kernel packages to a version greater than 4.13.6.
  • If updated packages are unavailable, contact your vendor for more information.
Public PoC/Exploit Available at Github

CVE-2017-15126 has a 1 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2017-15126.

URL Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=384632e67e0829deb8015ee6ad916b180049d252 Vendor Advisory
http://www.securityfocus.com/bid/102516 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:0676 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1062 Third Party Advisory
https://access.redhat.com/security/cve/CVE-2017-15126 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1523481 Issue Tracking Third Party Advisory
https://github.com/torvalds/linux/commit/384632e67e0829deb8015ee6ad916b180049d252 Third Party Advisory
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6 Vendor Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=384632e67e0829deb8015ee6ad916b180049d252 Vendor Advisory
http://www.securityfocus.com/bid/102516 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:0676 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1062 Third Party Advisory
https://access.redhat.com/security/cve/CVE-2017-15126 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1523481 Issue Tracking Third Party Advisory
https://github.com/torvalds/linux/commit/384632e67e0829deb8015ee6ad916b180049d252 Third Party Advisory
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6 Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2017-15126 is associated with the following CWEs:

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Place where I track kernel config and WHY I configured it in certain ways.

Shell

Updated: 10 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Feb. 24, 2024, 10:28 a.m. This repo has been linked 5 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2017-15126 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2017-15126 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=384632e67e0829deb8015ee6ad916b180049d252
    Added Reference http://www.securityfocus.com/bid/102516
    Added Reference https://access.redhat.com/errata/RHSA-2018:0676
    Added Reference https://access.redhat.com/errata/RHSA-2018:1062
    Added Reference https://access.redhat.com/security/cve/CVE-2017-15126
    Added Reference https://bugzilla.redhat.com/show_bug.cgi?id=1523481
    Added Reference https://github.com/torvalds/linux/commit/384632e67e0829deb8015ee6ad916b180049d252
    Added Reference https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Modified Analysis by [email protected]

    Feb. 05, 2024

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.11 up to (excluding) 4.13.6 *cpe:2.3:o:linux:linux_kernel:4.13.6:*:*:*:*:*:*:* OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.11 up to (excluding) 4.13.6
  • CVE Modified by [email protected]

    Feb. 12, 2023

    Action Type Old Value New Value
    Changed Description A flaw was found in the Linux kernel's handling of fork failure when dealing with event messages in the userfaultfd code. Failure to fork correctly can create a fork event that will be removed from an already freed list of events. A use-after-free flaw was found in fs/userfaultfd.c in the Linux kernel before 4.13.6. The issue is related to the handling of fork failure when dealing with event messages. Failure to fork correctly can lead to a situation where a fork event will be removed from an already freed list of events with userfaultfd_ctx_put().
    Removed CVSS V3 Red Hat, Inc. AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
    Added CWE Red Hat, Inc. CWE-119
  • CVE Modified by [email protected]

    Feb. 02, 2023

    Action Type Old Value New Value
    Changed Description A use-after-free flaw was found in fs/userfaultfd.c in the Linux kernel before 4.13.6. The issue is related to the handling of fork failure when dealing with event messages. Failure to fork correctly can lead to a situation where a fork event will be removed from an already freed list of events with userfaultfd_ctx_put(). A flaw was found in the Linux kernel's handling of fork failure when dealing with event messages in the userfaultfd code. Failure to fork correctly can create a fork event that will be removed from an already freed list of events.
    Added CVSS V3 Red Hat, Inc. AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
    Removed CWE Red Hat, Inc. CWE-119
    Removed CWE Reason CWE-119 / Assessment performed prior to CVMAP efforts
  • Modified Analysis by [email protected]

    Jan. 19, 2023

    Action Type Old Value New Value
    Removed CVSS V3 NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
    Added CVSS V3.1 NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type http://www.securityfocus.com/bid/102516 No Types Assigned http://www.securityfocus.com/bid/102516 Third Party Advisory, VDB Entry
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:0676 No Types Assigned https://access.redhat.com/errata/RHSA-2018:0676 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1062 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1062 Third Party Advisory
    Changed CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:4.13.6:*:*:*:*:*:*:* OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.11 up to (excluding) 4.13.6 *cpe:2.3:o:linux:linux_kernel:4.13.6:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Oct. 09, 2019

    Action Type Old Value New Value
    Added CWE Red Hat, Inc. CWE-119
  • CVE Modified by [email protected]

    May. 07, 2018

    Action Type Old Value New Value
    Added Reference http://www.securityfocus.com/bid/102516 [No Types Assigned]
  • CVE Modified by [email protected]

    Apr. 12, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:1062 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:0676 [No Types Assigned]
  • Initial Analysis by [email protected]

    Feb. 06, 2018

    Action Type Old Value New Value
    Added CVSS V2 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
    Added CVSS V3 AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://github.com/torvalds/linux/commit/384632e67e0829deb8015ee6ad916b180049d252 No Types Assigned https://github.com/torvalds/linux/commit/384632e67e0829deb8015ee6ad916b180049d252 Third Party Advisory
    Changed Reference Type https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6 No Types Assigned https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6 Vendor Advisory
    Changed Reference Type http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=384632e67e0829deb8015ee6ad916b180049d252 No Types Assigned http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=384632e67e0829deb8015ee6ad916b180049d252 Vendor Advisory
    Changed Reference Type https://access.redhat.com/security/cve/CVE-2017-15126 No Types Assigned https://access.redhat.com/security/cve/CVE-2017-15126 Third Party Advisory
    Changed Reference Type https://bugzilla.redhat.com/show_bug.cgi?id=1523481 No Types Assigned https://bugzilla.redhat.com/show_bug.cgi?id=1523481 Issue Tracking, Third Party Advisory
    Added CWE CWE-416
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:4.13.6:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 8.1
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Base CVSS Score: 9.3
Access Vector
Access Complexity
Authentication
Confidentiality Impact
Integrity Impact
Availability Impact
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

1.15 }} -0.06%

score

0.77645

percentile