The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://github.com/torvalds/linux/commit/f5527fffff3f002b0a6b376163613b82f69de073 | issue tracking third party advisory patch |
http://www.securitytracker.com/id/1037968 | vdb entry |
http://seclists.org/fulldisclosure/2016/Nov/76 | mailing list |
http://www.openwall.com/lists/oss-security/2016/11/24/8 | third party advisory mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=1395187 | issue tracking |
https://access.redhat.com/errata/RHSA-2018:1854 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:0932 | vendor advisory |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5527fffff3f002b0a6b376163613b82f69de073 | issue tracking patch vendor advisory |
https://access.redhat.com/errata/RHSA-2017:0933 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:0931 | vendor advisory |
http://www.securityfocus.com/bid/94532 | vdb entry |
https://source.android.com/security/bulletin/2017-03-01.html |