The keyring_detect_cycle_iterator function in security/keys/keyring.c in the Linux kernel through 3.13.6 does not properly determine whether keyrings are identical, which allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
References
Link | Resource |
---|---|
http://lkml.org/lkml/2014/2/27/507 | Third Party Advisory |
http://www.kernelhub.org/?msg=425013&p=2 | Broken Link |
http://www.openwall.com/lists/oss-security/2014/03/04/21 | Mailing List Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1072419 | Issue Tracking Patch Third Party Advisory |
http://lkml.org/lkml/2014/2/27/507 | Third Party Advisory |
http://www.kernelhub.org/?msg=425013&p=2 | Broken Link |
http://www.openwall.com/lists/oss-security/2014/03/04/21 | Mailing List Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1072419 | Issue Tracking Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2014-03-11 13:01
Updated : 2025-04-12 10:46
NVD link : CVE-2014-0102
Mitre link : CVE-2014-0102
CVE.ORG link : CVE-2014-0102
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-310
Cryptographic Issues