Bug 1185469 (CVE-2013-7421)
Summary: | CVE-2013-7421 Linux kernel: crypto api unprivileged arbitrary module load via request_module() | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Kurt Seifried <kseifried> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | aquini, bhu, ccoleman, dhoward, dmcphers, fhrbata, gansalmon, iboverma, itamar, jforbes, jialiu, jkacur, joelsmith, jokerman, jonathan, jross, jrusnack, jwboyer, kernel-maint, kernel-mgr, lgoncalv, lmeyer, madhu.chinakonda, matt, mchehab, mcressma, mmccomas, nmurray, plougher, pmatouse, rt-maint, rvrbovsk, slawomir, vgoyal, williams, wmealing |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
A flaw was found in the way the Linux kernel's Crypto subsystem handled automatic loading of kernel modules. A local user could use this flaw to load any installed kernel module, and thus increase the attack surface of the running kernel.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-08 02:38:25 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1190539, 1190547, 1190630, 1190631, 1190934, 1199152, 1199153, 1199154, 1199156, 1199157, 1199158 | ||
Bug Blocks: | 1185470 |
Description
Kurt Seifried
2015-01-23 20:48:23 UTC
Edited comment #0 to include additional information. Statement: This issue did not affect the versions of the kernel as shipped with Red Hat Enterprise Linux 4, 5, and 6. This issue affects the versions of the Linux as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1190934] This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:2411 https://rhn.redhat.com/errata/RHSA-2015-2411.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:2152 https://rhn.redhat.com/errata/RHSA-2015-2152.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:2152 https://rhn.redhat.com/errata/RHSA-2015-2152.html |