The keyring_detect_cycle_iterator function in security/keys/keyring.c in the Linux kernel through 3.13.6 does not properly determine whether keyrings are identical, which allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2014/03/04/21 | mailing list third party advisory patch |
http://www.kernelhub.org/?msg=425013&p=2 | broken link |
https://bugzilla.redhat.com/show_bug.cgi?id=1072419 | issue tracking third party advisory patch |
http://lkml.org/lkml/2014/2/27/507 | third party advisory mailing list |