CVE-2010-1437
moderate-risk
Published 2010-05-07
Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.
Do I need to act?
-
0.24% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.0/10
High
LOCAL
/ HIGH complexity
Affected Products (11)
References (42)
Broken Link
http://secunia.com/advisories/39830
Broken Link
http://secunia.com/advisories/40218
Broken Link
http://secunia.com/advisories/40645
Broken Link
http://secunia.com/advisories/43315
Mailing List
http://www.debian.org/security/2010/dsa-2053
Broken Link
http://www.securityfocus.com/bid/39719
Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/58254
Broken Link
https://patchwork.kernel.org/patch/94038/
and 22 more references
42
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
8/34 · Low
Exposure
16/34 · Moderate