The Linux kernel prior to 2.6.12.5 does not properly destroy a keyring that is not instantiated properly, which allows local users or remote malicious users to cause a denial of service (kernel oops) via a keyring with a payload that is not empty, which causes the creation to fail, leading to a null dereference in the keyring destructor.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel 2.6.0 |
||
linux linux kernel 2.6.10 |
||
linux linux kernel 2.6.11 |
||
linux linux kernel 2.6.11.7 |
||
linux linux kernel 2.6.11.8 |
||
linux linux kernel 2.6.2 |
||
linux linux kernel 2.6.3 |
||
linux linux kernel 2.6.8.1 |
||
linux linux kernel 2.6.8.1.5 |
||
linux linux kernel 2.6.11.1 |
||
linux linux kernel 2.6.11.2 |
||
linux linux kernel 2.6.4 |
||
linux linux kernel 2.6.5 |
||
linux linux kernel 2.6.6 |
||
linux linux kernel 2.6.8 |
||
linux linux kernel 2.6.9 |
||
linux linux kernel 2.6.1 |
||
linux linux kernel 2.6.11.3 |
||
linux linux kernel 2.6.11.4 |
||
linux linux kernel 2.6.11_rc1_bk6 |
||
linux linux kernel 2.6.7 |
||
linux linux kernel 2.6_test9_cvs |
||
linux linux kernel 2.6.11.5 |
||
linux linux kernel 2.6.11.6 |
||
linux linux kernel 2.6.12 |