A use-after-free flaw was found in fs/userfaultfd.c in the Linux kernel before 4.13.6. The issue is related to the handling of fork failure when dealing with event messages. Failure to fork correctly can lead to a situation where a fork event will be removed from an already freed list of events with userfaultfdctxput().
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-15126.json"
[
{
"digest": {
"function_hash": "324038283121269471536727879656671546266",
"length": 1928.0
},
"signature_version": "v1",
"target": {
"file": "fs/userfaultfd.c",
"function": "userfaultfd_ctx_read"
},
"signature_type": "Function",
"id": "CVE-2017-15126-024f3b72",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@384632e67e0829deb8015ee6ad916b180049d252",
"deprecated": false
},
{
"digest": {
"line_hashes": [
"29929957628210174276646604564514393751",
"227806916652118349574151163674119352224",
"306712206467865690209258340037135021315",
"98093958413093315899160292140045133401",
"238880341761118550113147953141375839434",
"292953951808234898922169518294953400905",
"149515922906358692355378644525336616110",
"131730213296447695371704788046014161146",
"30634690958670198855393735984480659568",
"196140967978260065022547277316208486628",
"150549881797324574585455874608258985481",
"287494889372464065393915538185868492490",
"210166789233886650370580947531376829228",
"58307731082078151328509560423217210083",
"182166192284877006122067573708695891867",
"75505415615324780368849317181149395954",
"44677845450648854438133892351903910972",
"42569365363546141153243308688673911253",
"81490177173292117542852526480020951162",
"130464121954265132611941521221643487926",
"319724776607431747074029736617033381719",
"401783966974192742742126468084163708",
"137905804087313218031654337021865121786",
"201541717412904143452260414197344225132"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "fs/userfaultfd.c"
},
"signature_type": "Line",
"id": "CVE-2017-15126-90f6d291",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@384632e67e0829deb8015ee6ad916b180049d252",
"deprecated": false
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-15126.json"
[
{
"digest": {
"line_hashes": [
"29929957628210174276646604564514393751",
"227806916652118349574151163674119352224",
"306712206467865690209258340037135021315",
"98093958413093315899160292140045133401",
"238880341761118550113147953141375839434",
"292953951808234898922169518294953400905",
"149515922906358692355378644525336616110",
"131730213296447695371704788046014161146",
"30634690958670198855393735984480659568",
"196140967978260065022547277316208486628",
"150549881797324574585455874608258985481",
"287494889372464065393915538185868492490",
"210166789233886650370580947531376829228",
"58307731082078151328509560423217210083",
"182166192284877006122067573708695891867",
"75505415615324780368849317181149395954",
"44677845450648854438133892351903910972",
"42569365363546141153243308688673911253",
"81490177173292117542852526480020951162",
"130464121954265132611941521221643487926",
"319724776607431747074029736617033381719",
"401783966974192742742126468084163708",
"137905804087313218031654337021865121786",
"201541717412904143452260414197344225132"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "fs/userfaultfd.c"
},
"signature_type": "Line",
"id": "CVE-2017-15126-aa3bd3fa",
"source": "https://github.com/torvalds/linux/commit/384632e67e0829deb8015ee6ad916b180049d252",
"deprecated": false
},
{
"digest": {
"function_hash": "324038283121269471536727879656671546266",
"length": 1928.0
},
"signature_version": "v1",
"target": {
"file": "fs/userfaultfd.c",
"function": "userfaultfd_ctx_read"
},
"signature_type": "Function",
"id": "CVE-2017-15126-ed5deff8",
"source": "https://github.com/torvalds/linux/commit/384632e67e0829deb8015ee6ad916b180049d252",
"deprecated": false
}
]