2.1
CVSSv2

CVE-2015-7872

Published: 16/11/2015 Updated: 13/02/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 188
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel up to and including 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues and several bugsare now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having Important securityimpact ...
A denial of service vulnerability was discovered in the keyring function's garbage collector in the Linux kernel The flaw allowed any local user account to trigger a kernel panic (CVE-2015-7872) ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
The system could be made to crash under certain conditions ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
The system could be made to crash under certain conditions ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
It was found that the Linux kernel's keys subsystem did not correctly garbage collect uninstantiated keyrings A local attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system ...

References

CWE-20http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce1fad2740c648a4340f6f6c391a8a83769d2e8chttps://github.com/torvalds/linux/commit/ce1fad2740c648a4340f6f6c391a8a83769d2e8chttps://github.com/torvalds/linux/commit/f05819df10d7b09f6d1eb6f8534a8f68e5a4fe61https://bugzilla.redhat.com/show_bug.cgi?id=1272172http://www.openwall.com/lists/oss-security/2015/10/20/6http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f05819df10d7b09f6d1eb6f8534a8f68e5a4fe61https://bugzilla.redhat.com/show_bug.cgi?id=1272371https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068676http://marc.info/?l=bugtraq&m=145975164525836&w=2http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlhttp://www.securityfocus.com/bid/77544http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0212.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0185.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0224.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.htmlhttp://www.ubuntu.com/usn/USN-2843-1http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.htmlhttp://www.ubuntu.com/usn/USN-2824-1http://www.debian.org/security/2015/dsa-3396http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.htmlhttp://rhn.redhat.com/errata/RHSA-2015-2636.htmlhttp://www.ubuntu.com/usn/USN-2843-2http://www.ubuntu.com/usn/USN-2823-1http://www.ubuntu.com/usn/USN-2826-1http://www.ubuntu.com/usn/USN-2829-1http://www.ubuntu.com/usn/USN-2840-2http://www.securitytracker.com/id/1034472http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.htmlhttp://www.ubuntu.com/usn/USN-2843-3http://www.ubuntu.com/usn/USN-2829-2http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.htmlhttp://www.ubuntu.com/usn/USN-2840-1https://source.android.com/security/bulletin/2016-12-01.htmlhttps://access.redhat.com/errata/RHSA-2015:2636https://nvd.nist.govhttps://usn.ubuntu.com/2840-1/https://access.redhat.com/security/cve/cve-2015-7872https://alas.aws.amazon.com/ALAS-2015-610.html