Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-3624

Опубликовано: 02 нояб. 2009
Источник: ubuntu
Приоритет: medium
CVSS2: 4.6

Описание

The get_instantiation_keyring function in security/keys/keyctl.c in the KEYS subsystem in the Linux kernel before 2.6.32-rc5 does not properly maintain the reference count of a keyring, which allows local users to gain privileges or cause a denial of service (OOPS) via vectors involving calls to this function without specifying a keyring by ID, as demonstrated by a series of keyctl request2 and keyctl list commands.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

not-affected

intrepid

not-affected

jaunty

not-affected

karmic

released

2.6.31-16.52
upstream

released

2.6.32~rc5

Показывать по

РелизСтатусПримечание
dapper

not-affected

devel

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

upstream

released

2.6.32~rc5

Показывать по

4.6 Medium

CVSS2

Связанные уязвимости

redhat
около 16 лет назад

The get_instantiation_keyring function in security/keys/keyctl.c in the KEYS subsystem in the Linux kernel before 2.6.32-rc5 does not properly maintain the reference count of a keyring, which allows local users to gain privileges or cause a denial of service (OOPS) via vectors involving calls to this function without specifying a keyring by ID, as demonstrated by a series of keyctl request2 and keyctl list commands.

nvd
около 16 лет назад

The get_instantiation_keyring function in security/keys/keyctl.c in the KEYS subsystem in the Linux kernel before 2.6.32-rc5 does not properly maintain the reference count of a keyring, which allows local users to gain privileges or cause a denial of service (OOPS) via vectors involving calls to this function without specifying a keyring by ID, as demonstrated by a series of keyctl request2 and keyctl list commands.

debian
около 16 лет назад

The get_instantiation_keyring function in security/keys/keyctl.c in th ...

github
больше 3 лет назад

The get_instantiation_keyring function in security/keys/keyctl.c in the KEYS subsystem in the Linux kernel before 2.6.32-rc5 does not properly maintain the reference count of a keyring, which allows local users to gain privileges or cause a denial of service (OOPS) via vectors involving calls to this function without specifying a keyring by ID, as demonstrated by a series of keyctl request2 and keyctl list commands.

4.6 Medium

CVSS2