Hide Forgot
A flaw was found in the Linux kernels key management system where it was possible for an attacker to escalate privileges or crash the machine. If a user key gets negatively instantiated, an error code is cached in the payload area. A negatively instantiated key may be then be positively instantiated by updating it with valid data. However, the ->update key type method must be aware that the error code may be there. Key management subsystems can abused to escalate privileges through memory corruption. Upstream: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=096fe9eaea40a17e125569f9e657e34cdb6d73bd
Acknowledgment: Red Hat would like to thank Dmitry Vyukov of Google engineering for reporting this issue to Red Hat.
CVE-2015-8539 was assigned: http://seclists.org/oss-sec/2015/q4/465
Statement: This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 4 and 5. This issue does affect the kernels shipped with Red Hat Enterprise Linux 6, 7, MRG-2 and realtime kernels and plans to be addressed in a future update.
External References: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=096fe9eaea40a17e125569f9e657e34cdb6d73bd
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:0151 https://access.redhat.com/errata/RHSA-2018:0151
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:0152 https://access.redhat.com/errata/RHSA-2018:0152
This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2018:0181 https://access.redhat.com/errata/RHSA-2018:0181