CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.2%
Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.34 | cpe:2.3:o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:* |
linux | linux_kernel | 2.6.34 | cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:* |
linux | linux_kernel | 2.6.34 | cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:* |
linux | linux_kernel | 2.6.34 | cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:* |
linux | linux_kernel | 2.6.34 | cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:* |
opensuse | opensuse | 11.1 | cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* |
suse | linux_enterprise_desktop | 11 | cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:* |
suse | linux_enterprise_high_availability_extension | 11 | cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:-:*:*:*:*:*:* |
suse | linux_enterprise_server | 11 | cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html
marc.info/?l=linux-kernel&m=127192182917857&w=2
marc.info/?l=linux-kernel&m=127274294622730&w=2
marc.info/?l=linux-kernel&m=127292492727029&w=2
secunia.com/advisories/39830
secunia.com/advisories/40218
secunia.com/advisories/40645
secunia.com/advisories/43315
www.debian.org/security/2010/dsa-2053
www.openwall.com/lists/oss-security/2010/04/27/2
www.openwall.com/lists/oss-security/2010/04/28/2
www.redhat.com/support/errata/RHSA-2010-0474.html
www.securityfocus.com/archive/1/516397/100/0/threaded
www.securityfocus.com/bid/39719
www.vmware.com/security/advisories/VMSA-2011-0003.html
www.vupen.com/english/advisories/2010/1857
bugzilla.redhat.com/show_bug.cgi?id=585094
exchange.xforce.ibmcloud.com/vulnerabilities/58254
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9715
patchwork.kernel.org/patch/94038/
patchwork.kernel.org/patch/94664/
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.2%