security/keys/big_key.c in the Linux kernel before 4.8.7 mishandles unsuccessful crypto registration in conjunction with successful key-type registration, which allows local users to cause a denial of service (NULL pointer dereference and panic) or possibly have unspecified other impact via a crafted application that uses the big_key data type.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2016/07/22/1 | mailing list third party advisory exploit |
https://github.com/torvalds/linux/commit/7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb | patch third party advisory issue tracking |
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.7 | release notes |
http://www.securityfocus.com/bid/94546 | third party advisory vdb entry |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb | patch third party advisory issue tracking |