First published: Fri Dec 08 2017(Updated: )
Linux Kernel could allow a local authenticated attacker to bypass security restrictions, caused by omitting an access-control check when adding a key to the current task's default request-key keyring in the KEYS subsystem. By using a sequence of specially-crafted system calls, an attacker could exploit this vulnerability to add keys to a keyring with only Search permission.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1127.rt56.1093.el7 | 0:3.10.0-1127.rt56.1093.el7 |
redhat/kernel | <0:3.10.0-1127.el7 | 0:3.10.0-1127.el7 |
IBM Data Risk Manager | <=2.0.6 | |
Linux Linux kernel | <4.14.6 | |
redhat/kernel | <14.4.6 | 14.4.6 |
ubuntu/linux | <4.13.0-38.43 | 4.13.0-38.43 |
ubuntu/linux | <3.13.0-144.193 | 3.13.0-144.193 |
ubuntu/linux | <4.15~ | 4.15~ |
ubuntu/linux | <4.4.0-119.143 | 4.4.0-119.143 |
ubuntu/linux-armadaxp | <4.15~ | 4.15~ |
ubuntu/linux-aws | <4.4.0-1016.16 | 4.4.0-1016.16 |
ubuntu/linux-aws | <4.15~ | 4.15~ |
ubuntu/linux-aws | <4.4.0-1054.63 | 4.4.0-1054.63 |
ubuntu/linux-azure | <4.15~ | 4.15~ |
ubuntu/linux-azure | <4.13.0-1014.17 | 4.13.0-1014.17 |
ubuntu/linux-euclid | <4.15~ | 4.15~ |
ubuntu/linux-flo | <4.15~ | 4.15~ |
ubuntu/linux-gcp | <4.15~ | 4.15~ |
ubuntu/linux-gcp | <4.13.0-1012.16 | 4.13.0-1012.16 |
ubuntu/linux-gke | <4.15~ | 4.15~ |
ubuntu/linux-goldfish | <4.15~ | 4.15~ |
ubuntu/linux-grouper | <4.15~ | 4.15~ |
ubuntu/linux-hwe | <4.15~ | 4.15~ |
ubuntu/linux-hwe | <4.13.0-38.43~16.04.1 | 4.13.0-38.43~16.04.1 |
ubuntu/linux-hwe-edge | <4.18.0-8.9~18.04.1 | 4.18.0-8.9~18.04.1 |
ubuntu/linux-hwe-edge | <4.15~ | 4.15~ |
ubuntu/linux-hwe-edge | <4.13.0-38.43~16.04.1 | 4.13.0-38.43~16.04.1 |
ubuntu/linux-kvm | <4.15~ | 4.15~ |
ubuntu/linux-kvm | <4.4.0-1020.25 | 4.4.0-1020.25 |
ubuntu/linux-linaro-omap | <4.15~ | 4.15~ |
ubuntu/linux-linaro-shared | <4.15~ | 4.15~ |
ubuntu/linux-linaro-vexpress | <4.15~ | 4.15~ |
ubuntu/linux-lts-quantal | <4.15~ | 4.15~ |
ubuntu/linux-lts-raring | <4.15~ | 4.15~ |
ubuntu/linux-lts-saucy | <4.15~ | 4.15~ |
ubuntu/linux-lts-trusty | <4.15~ | 4.15~ |
ubuntu/linux-lts-utopic | <4.15~ | 4.15~ |
ubuntu/linux-lts-vivid | <4.15~ | 4.15~ |
ubuntu/linux-lts-wily | <4.15~ | 4.15~ |
ubuntu/linux-lts-xenial | <4.4.0-119.143~14.04.1 | 4.4.0-119.143~14.04.1 |
ubuntu/linux-lts-xenial | <4.15~ | 4.15~ |
ubuntu/linux-maguro | <4.15~ | 4.15~ |
ubuntu/linux-mako | <4.15~ | 4.15~ |
ubuntu/linux-manta | <4.15~ | 4.15~ |
ubuntu/linux-oem | <4.15~ | 4.15~ |
ubuntu/linux-oem | <4.13.0-1022.24 | 4.13.0-1022.24 |
ubuntu/linux-qcm-msm | <4.15~ | 4.15~ |
ubuntu/linux-raspi2 | <4.13.0-1016.17 | 4.13.0-1016.17 |
ubuntu/linux-raspi2 | <4.15~ | 4.15~ |
ubuntu/linux-raspi2 | <4.4.0-1086.94 | 4.4.0-1086.94 |
ubuntu/linux-snapdragon | <4.4.0-1088.93 | 4.4.0-1088.93 |
ubuntu/linux-snapdragon | <4.15~ | 4.15~ |
ubuntu/linux-snapdragon | <4.4.0-1088.93 | 4.4.0-1088.93 |
ubuntu/linux-ti-omap4 | <4.15~ | 4.15~ |
Google Android | ||
debian/linux | 4.19.249-2 4.19.304-1 5.10.209-2 5.10.216-1 6.1.76-1 6.1.90-1 6.7.12-1 6.8.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)