Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-9529

Опубликовано: 09 янв. 2015
Источник: debian
EPSS Низкий

Описание

Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed3.16.7-ckt4-1package
linux-2.6not-affectedpackage

Примечания

  • http://marc.info/?l=linux-kernel&m=141986398232547&w=2

  • http://marc.info/?l=linux-kernel&m=142047362307894&w=2

EPSS

Процентиль: 28%
0.00094
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.

redhat
больше 10 лет назад

Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.

nvd
больше 10 лет назад

Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.

github
около 3 лет назад

Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.

oracle-oval
около 10 лет назад

ELSA-2015-3032: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 28%
0.00094
Низкий