Описание
The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent.
A flaw was found in the Linux kernel key management subsystem in which a local attacker could crash the kernel or corrupt the stack and additional memory (denial of service) by supplying a specially crafted RSA key. This flaw panics the machine during the verification of the RSA key.
Отчет
This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7, MRG-2 and realtime kernels. This issue does not affect kernels that ship with Red Hat Enterprise Linux 5.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kernel | Not affected | ||
Red Hat Enterprise Linux 6 | kernel | Fixed | RHSA-2018:1854 | 19.06.2018 |
Red Hat Enterprise Linux 7 | kernel-rt | Fixed | RHSA-2017:0931 | 12.04.2017 |
Red Hat Enterprise Linux 7 | kernel | Fixed | RHSA-2017:0933 | 12.04.2017 |
Red Hat Enterprise MRG 2 | kernel-rt | Fixed | RHSA-2017:0932 | 12.04.2017 |
Показывать по
Дополнительная информация
Статус:
8.8 High
CVSS3
4.9 Medium
CVSS2
Связанные уязвимости
The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent.
The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent.
The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through ...
The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent.
ELSA-2016-3651: Unbreakable Enterprise kernel security update (IMPORTANT)
8.8 High
CVSS3
4.9 Medium
CVSS2