Note:
This project will be discontinued after December 13, 2021. [more]
2017-10-28
The KEYS subsystem in the Linux kernel before 4.13.10 does not correctly synchronize the actions of updating versus finding a key in the "negative" state to avoid a race condition, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls.
Products | Linux_kernel |
Type | Improper Input Validation (CWE-20) |
First patch |
https://github.com/torvalds/linux/commit/363b02dab09b3226f3bd1420dad9c72b79a42a76 |
Patches | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=363b02dab09b3226f3bd1420dad9c72b79a42a76 |
Relevant file/s |
• ./include/linux/key.h (modified, +30, -17)
• ./net/dns_resolver/dns_key.c (modified, +1, -1) • ./security/keys/big_key.c (modified, +2, -2) • ./security/keys/encrypted-keys/encrypted.c (modified, +1, -1) • ./security/keys/gc.c (modified, +4, -4)
• ./security/keys/key.c (modified, +20, -11)
• ./security/keys/keyctl.c (modified, +4, -5) • ./security/keys/keyring.c (modified, +5, -5) • ./security/keys/proc.c (modified, +5, -2) • ./security/keys/process_keys.c (modified, +1, -1) • ./security/keys/request_key.c (modified, +3, -4) • ./security/keys/request_key_auth.c (modified, +1, -1) • ./security/keys/trusted.c (modified, +1, -1) • ./security/keys/user_defined.c (modified, +2, -2) |
Links |
• http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.10
• http://www.securityfocus.com/bid/101621 |
Navigation
Patch data:
Patched area:
(on by default)
Patched area: