Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-1437

Опубликовано: 23 апр. 2010
Источник: redhat
CVSS2: 7.2
EPSS Низкий

Описание

Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.

Отчет

This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3. Future kernel updates in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG will address this issue.

Дополнительная информация

Статус:

Important
Дефект:
CWE-672->CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=585094kernel: keyrings: find_keyring_by_name() can gain the freed keyring

EPSS

Процентиль: 47%
0.00241
Низкий

7.2 High

CVSS2

Связанные уязвимости

CVSS3: 7
ubuntu
около 15 лет назад

Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.

CVSS3: 7
nvd
около 15 лет назад

Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.

CVSS3: 7
debian
около 15 лет назад

Race condition in the find_keyring_by_name function in security/keys/k ...

CVSS3: 7
github
около 3 лет назад

Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.

oracle-oval
почти 15 лет назад

ELSA-2010-0504: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 47%
0.00241
Низкий

7.2 High

CVSS2