First published: Wed Sep 20 2017(Updated: )
A vulnerability in the Key Management sub component was found in the Linux kernel. Trying to KEYTCL_READ on negative key would lead to a NULL pointer dereference. A local attacker could use this flaw to crash the kernel. References: <a href="https://lkml.org/lkml/2017/9/18/764">https://lkml.org/lkml/2017/9/18/764</a> <a href="http://seclists.org/oss-sec/2017/q4/63">http://seclists.org/oss-sec/2017/q4/63</a> An upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37863c43b2c6464f252862bf2e9768264e961678">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37863c43b2c6464f252862bf2e9768264e961678</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=4.13.4 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-12192.
CVE-2017-12192 has a medium severity level.
This vulnerability affects Linux kernel versions before 4.13.5.
CVE-2017-12192 allows local users to cause a denial of service (OOPS and system crash).
Yes, the fix is available in Linux kernel version 4.13.5 and higher.