The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-378-1 | linux-2.6 security update |
Debian DSA |
DSA-3434-1 | linux security update |
EUVD |
EUVD-2015-7464 | The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls. |
Ubuntu USN |
USN-2888-1 | Linux kernel (Utopic HWE) vulnerabilities |
Ubuntu USN |
USN-2890-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2890-2 | Linux kernel (Wily HWE) vulnerabilities |
Ubuntu USN |
USN-2890-3 | Linux kernel (Raspberry Pi 2) vulnerabilities |
Ubuntu USN |
USN-2907-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2907-2 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-2910-1 | Linux kernel (Vivid HWE) vulnerabilities |
Ubuntu USN |
USN-2911-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-2911-2 | Linux kernel (OMAP4) vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T07:51:28.463Z
Reserved: 2015-09-29T00:00:00
Link: CVE-2015-7550
No data.
Status : Deferred
Published: 2016-02-08T03:59:02.010
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-7550
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN