First published: Fri Mar 24 2017(Updated: )
In was found that in the Linux kernel in vmw_surface_define_ioctl() function in 'drivers/gpu/drm/vmwgfx/vmwgfx_surface.c' file, a 'num_sizes' parameter is assigned a user-controlled value which is not checked if it is zero. This is used in a call to kmalloc() and later leads to dereferencing ZERO_SIZE_PTR, which in turn leads to a GPF and possibly to a kernel panic. References: <a href="http://seclists.org/oss-sec/2017/q1/684">http://seclists.org/oss-sec/2017/q1/684</a> Proposed patch: <a href="https://lists.freedesktop.org/archives/dri-devel/2017-March/136814.html">https://lists.freedesktop.org/archives/dri-devel/2017-March/136814.html</a> <a href="http://marc.info/?t=149037004200005&r=1&w=2">http://marc.info/?t=149037004200005&r=1&w=2</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.10.5 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-7261.
The severity of CVE-2017-7261 is low.
The affected software of CVE-2017-7261 includes various Linux kernel versions up to 4.10.5.
Local users can exploit CVE-2017-7261 by crafting a malicious ioctl request to the vmw_surface_define_ioctl function in the Linux kernel.
Yes, the fix for CVE-2017-7261 is available in Linux kernel version 4.11~ and later.