Description
Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
References (9)
Core 9
Core References
Exploit, Patch, Vendor Advisory x_refsource_confirm
https://github.com/torvalds/linux/commit/77da160530dd1dc94f6ae15a981f24e5f0021e84
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:1308
Third Party Advisory x_refsource_confirm
http://source.android.com/security/bulletin/2016-11-01.html
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:0892
Release Notes x_refsource_confirm
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.1
Exploit, Patch, Vendor Advisory x_refsource_confirm
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=77da160530dd1dc94f6ae15a981f24e5f0021e84
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:1298
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/94135
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2017:1297
Scores
CVSS v3
7.8
EPSS
0.0026
EPSS Percentile
49.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-416
Status
published
Products (1)
linux/linux_kernel
< 3.2.84
Published
Nov 16, 2016
Tracked Since
Feb 18, 2026