First published: Thu Apr 13 2017(Updated: )
A vulnerability was found in the Linux kernel. It was found that keyctl_set_reqkey_keyring() function leaks thread keyring which allows unprivileged local user to exhaust kernel memory. References: <a href="https://lkml.org/lkml/2017/4/1/235">https://lkml.org/lkml/2017/4/1/235</a> <a href="https://lkml.org/lkml/2017/4/3/724">https://lkml.org/lkml/2017/4/3/724</a> <a href="http://seclists.org/oss-sec/2017/q2/246">http://seclists.org/oss-sec/2017/q2/246</a> Upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c9f838d104fed6f2f61d68164712e3204bf5271b">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c9f838d104fed6f2f61d68164712e3204bf5271b</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.10.12 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID of this vulnerability is CVE-2017-7472.
The severity level of CVE-2017-7472 is medium (4 out of 10).
The affected software for CVE-2017-7472 includes various versions of the Linux kernel before 4.11~ in different distributions.
CVE-2017-7472 allows local users to cause a denial of service (memory consumption) via a series of keyctl_set_reqkey_keyring calls.
Yes, you can find more information about CVE-2017-7472 at the following links: [Reference 1](https://lkml.org/lkml/2017/4/1/235), [Reference 2](https://lkml.org/lkml/2017/4/3/724), [Reference 3](http://seclists.org/oss-sec/2017/q2/246).