Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 325571 (CVE-2010-1437) - Kernel: race condition in find_keyring_by_name() (CVE-2010-1437)
Summary: Kernel: race condition in find_keyring_by_name() (CVE-2010-1437)
Status: RESOLVED FIXED
Alias: CVE-2010-1437
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: https://patchwork.kernel.org/patch/94...
Whiteboard: [ linux <= 2.6.34-rc5 ]
Keywords:
Depends on:
Blocks:
 
Reported: 2010-06-25 19:55 UTC by Stefan Behte (RETIRED)
Modified: 2013-09-15 19:39 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Behte (RETIRED) gentoo-dev Security 2010-06-25 19:55:52 UTC
CVE-2010-1437 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1437):
  Race condition in the find_keyring_by_name function in
  security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier
  allows local users to cause a denial of service (memory corruption
  and system crash) or possibly have unspecified other impact via
  keyctl session commands that trigger access to a dead keyring that is
  undergoing deletion by the key_cleanup function.
Comment 1 Stefan Behte (RETIRED) gentoo-dev Security 2010-06-25 21:37:54 UTC
CVE-2010-1437 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1437):
  Race condition in the find_keyring_by_name function in
  security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier
  allows local users to cause a denial of service (memory corruption
  and system crash) or possibly have unspecified other impact via
  keyctl session commands that trigger access to a dead keyring that is
  undergoing deletion by the key_cleanup function.

Comment 2 Anthony Basile gentoo-dev 2010-06-26 01:19:03 UTC
Of the hardened sources currently in the tree, none of the hardened-sources-2.6.32* are vulnerable.  They are based off of kernels > 2.6.32.10.