Summary: | Kernel: race condition in find_keyring_by_name() (CVE-2010-1437) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Stefan Behte (RETIRED) <craig> |
Component: | Kernel | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | hardened-kernel+disabled, hardened, kernel |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://patchwork.kernel.org/patch/94664/ | ||
Whiteboard: | [ linux <= 2.6.34-rc5 ] | ||
Package list: | Runtime testing required: | --- |
Description
Stefan Behte (RETIRED)
![]() ![]() CVE-2010-1437 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1437): Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function. Of the hardened sources currently in the tree, none of the hardened-sources-2.6.32* are vulnerable. They are based off of kernels > 2.6.32.10. |