The KEYS subsystem in the Linux kernel before 4.13.10 does not correctly synchronize the actions of updating versus finding a key in the "negative" state to avoid a race condition, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=363b02dab09b3226f3bd1420dad9c72b79a42a76 | issue tracking third party advisory patch |
https://github.com/torvalds/linux/commit/363b02dab09b3226f3bd1420dad9c72b79a42a76 | issue tracking third party advisory patch |
http://www.securityfocus.com/bid/101621 | vdb entry third party advisory |
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.10 | release notes vendor advisory |