First published: Tue Nov 15 2016(Updated: )
A flaw was found in the Linux kernel key management subsystem in which a local attacker could crash the kernel or corrupt the stack and additional memory (denial of service) by supplying a specially crafted RSA key. This flaw panics the machine during the verification of the RSA key and is key-payload independant. This vulnerably can be triggered by any unprivileged user with a local shell account. References: <a href="http://seclists.org/fulldisclosure/2016/Nov/76">http://seclists.org/fulldisclosure/2016/Nov/76</a> Product bug: <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=1343162">https://bugzilla.redhat.com/show_bug.cgi?id=1343162</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Linux Kernel | <=4.8.11 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2016-8650.
CVE-2016-8650 has a severity value of 7, which is high.
CVE-2016-8650 can cause a denial of service (stack memory corruption and panic) in the Linux kernel.
The Linux kernel versions through 4.8.11 are affected by CVE-2016-8650.
To fix CVE-2016-8650, you should update your Linux kernel to version 4.8.12 or higher.