Description
Race condition in the (1) add_key, (2) request_key, and (3) keyctl functions in Linux kernel 2.6.x allows local users to cause a denial of service (crash) or read sensitive kernel memory by modifying the length of a string argument between the time that the kernel calculates the length and when it copies the data into kernel memory.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2006-0464 | Race condition in the (1) add_key, (2) request_key, and (3) keyctl functions in Linux kernel 2.6.x allows local users to cause a denial of service (crash) or read sensitive kernel memory by modifying the length of a string argument between the time that the kernel calculates the length and when it copies the data into kernel memory. |
Ubuntu USN |
USN-263-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T16:34:14.828Z
Reserved: 2006-01-27T00:00:00.000Z
Link: CVE-2006-0457
No data.
Status : Deferred
Published: 2006-03-14T02:02:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2006-0457
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN