Bug 1272371 (CVE-2015-7872)
Summary: | CVE-2015-7872 kernel: Keyrings crash triggerable by unprivileged user | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aquini, arm-mgr, bhu, blc, carnil, dhoward, fhrbata, gansalmon, iboverma, itamar, jbastian, jforbes, jindrich.novy, jkacur, joelsmith, jonathan, jross, jwboyer, kernel-maint, kernel-mgr, kstutsma, lgoncalv, madhu.chinakonda, matt, mchehab, mcressma, mlangsdo, mrg-program-list, nmurray, plougher, pmatouse, rt-maint, rvrbovsk, slawomir, slong, vgoyal, vvs, williams, wmealing |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
It was found that the Linux kernel's keys subsystem did not correctly garbage collect uninstantiated keyrings. A local attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-08 02:44:10 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1272172, 1273463, 1273465, 1275926, 1275927, 1275928, 1275929, 1275930, 1275931, 1275932, 1275933, 1275934, 1291660 | ||
Bug Blocks: | 1272373 |
Description
Adam Mariš
2015-10-16 09:35:42 UTC
Upstream patch: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce1fad2740c648a4340f6f6c391a8a83769d2e8c CVE request: http://seclists.org/oss-sec/2015/q4/111 Statement: This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 6 , 7 and Red Hat MRG 2. Future updates for the respective releases may address this flaw. This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2015:2636 https://rhn.redhat.com/errata/RHSA-2015-2636.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:0212 https://rhn.redhat.com/errata/RHSA-2016-0212.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:0185 https://rhn.redhat.com/errata/RHSA-2016-0185.html This issue has been addressed in the following products: MRG for RHEL-6 v.2 Via RHSA-2016:0224 https://rhn.redhat.com/errata/RHSA-2016-0224.html |