Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-12192

Опубликовано: 18 сент. 2017
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.

A vulnerability was found in the Key Management sub component of the Linux kernel, where when trying to issue a KEYTCL_READ on a negative key would lead to a NULL pointer dereference. A local attacker could use this flaw to crash the kernel.

Отчет

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases will address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2020:243009.06.2020
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2018:015225.01.2018
Red Hat Enterprise Linux 7kernelFixedRHSA-2018:015125.01.2018
Red Hat Enterprise Linux 7kernel-altFixedRHSA-2018:065410.04.2018
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2018:018125.01.2018

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=1493435kernel: NULL pointer dereference due to KEYCTL_READ on negative key

EPSS

Процентиль: 13%
0.00044
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 7 лет назад

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.

CVSS3: 5.5
nvd
больше 7 лет назад

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.

CVSS3: 5.5
debian
больше 7 лет назад

The keyctl_read_key function in security/keys/keyctl.c in the Key Mana ...

CVSS3: 5.5
github
около 3 лет назад

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.

oracle-oval
около 5 лет назад

ELSA-2020-2430: kernel security and bug fix update (MODERATE)

EPSS

Процентиль: 13%
0.00044
Низкий

5.5 Medium

CVSS3