The keyctl_session_to_parent function in security/keys/keyctl.c in the Linux kernel 2.6.35.4 and earlier expects that a certain parent session keyring exists, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a KEYCTL_SESSION_TO_PARENT argument to the keyctl function.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
http://www.ubuntu.com/usn/USN-1000-1 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2010/09/02/1 | third party advisory mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/61557 | third party advisory vdb entry |
http://www.securityfocus.com/bid/42932 | third party advisory vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html | vendor advisory mailing list third party advisory |
http://www.vupen.com/english/advisories/2011/0298 | vdb entry broken link |
http://secunia.com/advisories/41263 | third party advisory broken link |
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html | vendor advisory mailing list third party advisory |
http://twitter.com/taviso/statuses/22777866582 | third party advisory |
http://securitytracker.com/id?1024384 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=627440 | patch exploit third party advisory issue tracking |