Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 480592 - (CVE-2009-0031) CVE-2009-0031 kernel: local denial of service in keyctl_join_session_keyring
CVE-2009-0031 kernel: local denial of service in keyctl_join_session_keyring
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity high
: ---
: ---
Assigned To: Red Hat Product Security
source=git,reported=20090117,public=2...
:
Depends On: 480595 480596 480597 480598 480599
Blocks:
  Show dependency treegraph
 
Reported: 2009-01-19 06:44 EST by Mark J. Cox
Modified: 2018-10-19 21:38 EDT (History)
10 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2011-09-30 17:23:36 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2009:0264 normal SHIPPED_LIVE Important: kernel security update 2009-02-10 10:51:56 EST
Red Hat Product Errata RHSA-2009:0331 normal SHIPPED_LIVE Important: kernel security and bug fix update 2009-03-12 10:41:10 EDT
Red Hat Product Errata RHSA-2009:0360 normal SHIPPED_LIVE Important: kernel-rt security and bug fix update 2009-03-26 20:15:06 EDT

  None (edit)
Description Mark J. Cox 2009-01-19 06:44:33 EST
According to upstream commit 0d54ee1c7850a954026deec4cd4885f331da35cc "security: introduce missing kfree" there is a missing kfree in
keyctl_join_session_keyring.

It looks like a local user could eventually cause a DoS by using up kernel memory, so I assigned this CVE-2009-0031.

http://git2.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0d54ee1c7850a954026deec4cd4885f331da35cc

This should only affect the RHEL4,5,MRG kernels and not RHEL2.1,3 which did not have this code.  I tested this on RHEL5 and kernel memory usage does increase (although it does take some time to DoS a machine and would likely be noticed, I've left the impact as important for now though).

Patch in URL above.
Comment 8 errata-xmlrpc 2009-03-12 10:41:21 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4

Via RHSA-2009:0331 http://rhn.redhat.com/errata/RHSA-2009:0331.html
Comment 14 errata-xmlrpc 2009-03-26 20:14:56 EDT
This issue has been addressed in following products:

  MRG for RHEL-5

Via RHSA-2009:0360 https://rhn.redhat.com/errata/RHSA-2009-0360.html

Note You need to log in before you can comment on or make changes to this bug.