Hide Forgot
A flaw was found in the Linux kernel key management subsystem in which a local attacker could crash the kernel or corrupt the stack and additional memory (denial of service) by supplying a specially crafted RSA key. This flaw panics the machine during the verification of the RSA key and is key-payload independant. This vulnerably can be triggered by any unprivileged user with a local shell account. References: http://seclists.org/fulldisclosure/2016/Nov/76 Product bug: https://bugzilla.redhat.com/show_bug.cgi?id=1343162
Statement: This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7, MRG-2 and realtime kernels. This issue does not affect kernels that ship with Red Hat Enterprise Linux 5.
Proposed patch: https://lkml.org/lkml/2016/11/23/477
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1398463]
This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2017:0932 https://access.redhat.com/errata/RHSA-2017:0932
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:0931 https://access.redhat.com/errata/RHSA-2017:0931
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:0933 https://access.redhat.com/errata/RHSA-2017:0933
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2018:1854 https://access.redhat.com/errata/RHSA-2018:1854