The KEYS subsystem in the Linux kernel before 4.13.10 does not correctly synchronize the actions of updating versus finding a key in the "negative" state to avoid a race condition, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-7367 | The KEYS subsystem in the Linux kernel before 4.13.10 does not correctly synchronize the actions of updating versus finding a key in the "negative" state to avoid a race condition, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls. |
Ubuntu USN |
USN-3485-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3485-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3485-3 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-3507-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3507-2 | Linux kernel (GCP) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:13:06.206Z
Reserved: 2017-10-27T00:00:00
Link: CVE-2017-15951
No data.
Status : Deferred
Published: 2017-10-28T02:29:00.217
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-15951
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN