The keyctl_session_to_parent function in security/keys/keyctl.c in the Linux kernel 2.6.35.4 and earlier expects that a certain parent session keyring exists, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a KEYCTL_SESSION_TO_PARENT argument to the keyctl function.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The keyctl_session_to_parent function in security/keys/keyctl.c in the Linux kernel 2.6.35.4 and earlier expects that a certain parent session keyring exists, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a KEYCTL_SESSION_TO_PARENT argument to the keyctl function.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.ubuntu.com/usn/USN-1000-1 | vendor-advisory x_refsource_UBUNTU |
http://www.openwall.com/lists/oss-security/2010/09/02/1 | mailing-list x_refsource_MLIST |
https://exchange.xforce.ibmcloud.com/vulnerabilities/61557 | vdb-entry x_refsource_XF |
http://www.securityfocus.com/bid/42932 | vdb-entry x_refsource_BID |
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html | vendor-advisory x_refsource_SUSE |
http://www.vupen.com/english/advisories/2011/0298 | vdb-entry x_refsource_VUPEN |
http://secunia.com/advisories/41263 | third-party-advisory x_refsource_SECUNIA |
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html | vendor-advisory x_refsource_SUSE |
http://twitter.com/taviso/statuses/22777866582 | x_refsource_MISC |
http://securitytracker.com/id?1024384 | vdb-entry x_refsource_SECTRACK |
https://bugzilla.redhat.com/show_bug.cgi?id=627440 | x_refsource_CONFIRM |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
The keyctl_session_to_parent function in security/keys/keyctl.c in the Linux kernel 2.6.35.4 and earlier expects that a certain parent session keyring exists, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a KEYCTL_SESSION_TO_PARENT argument to the keyctl function.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 3.1 | 7.8 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Primary | 2.0 | 7.2 | HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
Hyperlink | Source | Resource |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html | security@ubuntu.com | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html | security@ubuntu.com | Mailing List Third Party Advisory |
http://secunia.com/advisories/41263 | security@ubuntu.com | Broken Link |
http://securitytracker.com/id?1024384 | security@ubuntu.com | Third Party Advisory VDB Entry |
http://twitter.com/taviso/statuses/22777866582 | security@ubuntu.com | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2010/09/02/1 | security@ubuntu.com | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/42932 | security@ubuntu.com | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-1000-1 | security@ubuntu.com | Third Party Advisory |
http://www.vupen.com/english/advisories/2011/0298 | security@ubuntu.com | Broken Link |
https://bugzilla.redhat.com/show_bug.cgi?id=627440 | security@ubuntu.com | Exploit Issue Tracking Patch Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/61557 | security@ubuntu.com | Third Party Advisory VDB Entry |
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://secunia.com/advisories/41263 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link |
http://securitytracker.com/id?1024384 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
http://twitter.com/taviso/statuses/22777866582 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2010/09/02/1 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/42932 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-1000-1 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.vupen.com/english/advisories/2011/0298 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link |
https://bugzilla.redhat.com/show_bug.cgi?id=627440 | af854a3a-2127-422b-91ae-364da2661108 | Exploit Issue Tracking Patch Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/61557 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |