CVE-2015-8539 (NVD)

2016-02-08

The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.

Products Ubuntu_linux, Linux_kernel, Linux_enterprise_real_time_extension
Type Improper Privilege Management (CWE-269)
First patch https://github.com/torvalds/linux/commit/096fe9eaea40a17e125569f9e657e34cdb6d73bd
Relevant file/s • ./security/keys/encrypted-keys/encrypted.c (modified, +2)
• ./security/keys/trusted.c (modified, +4, -1)
• ./security/keys/user_defined.c (modified, +4, -1)
Links http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html
https://access.redhat.com/errata/RHSA-2018:0181

linux - Tree: 096fe9eaea

(? files)

Filter Settings
Files
Navigation
Patch data:

(on by default)


Patched area: