The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key."
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key."
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://lkml.org/lkml/2011/11/15/363 | mailing-list x_refsource_MLIST |
http://www.securityfocus.com/bid/50755 | vdb-entry x_refsource_BID |
http://www.ubuntu.com/usn/USN-1328-1 | vendor-advisory x_refsource_UBUNTU |
http://www.ubuntu.com/usn/USN-1344-1 | vendor-advisory x_refsource_UBUNTU |
http://www.openwall.com/lists/oss-security/2011/11/22/5 | mailing-list x_refsource_MLIST |
http://www.openwall.com/lists/oss-security/2011/11/21/19 | mailing-list x_refsource_MLIST |
http://www.ubuntu.com/usn/USN-1324-1 | vendor-advisory x_refsource_UBUNTU |
https://bugzilla.redhat.com/show_bug.cgi?id=751297 | x_refsource_CONFIRM |
http://secunia.com/advisories/47754 | third-party-advisory x_refsource_SECUNIA |
http://www.openwall.com/lists/oss-security/2011/11/22/6 | mailing-list x_refsource_MLIST |
http://marc.info/?l=bugtraq&m=139447903326211&w=2 | vendor-advisory x_refsource_HP |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://lkml.org/lkml/2011/11/15/363 | mailing-list x_refsource_MLIST x_transferred |
http://www.securityfocus.com/bid/50755 | vdb-entry x_refsource_BID x_transferred |
http://www.ubuntu.com/usn/USN-1328-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
http://www.ubuntu.com/usn/USN-1344-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
http://www.openwall.com/lists/oss-security/2011/11/22/5 | mailing-list x_refsource_MLIST x_transferred |
http://www.openwall.com/lists/oss-security/2011/11/21/19 | mailing-list x_refsource_MLIST x_transferred |
http://www.ubuntu.com/usn/USN-1324-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
https://bugzilla.redhat.com/show_bug.cgi?id=751297 | x_refsource_CONFIRM x_transferred |
http://secunia.com/advisories/47754 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.openwall.com/lists/oss-security/2011/11/22/6 | mailing-list x_refsource_MLIST x_transferred |
http://marc.info/?l=bugtraq&m=139447903326211&w=2 | vendor-advisory x_refsource_HP x_transferred |
The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key."
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 2.1 | LOW | AV:L/AC:L/Au:N/C:N/I:N/A:P |