CVE-2010-1437

Impact:
Important
Public Date:
2010-04-23
IAVA:
2011-A-0066
CWE:
CWE-672->CWE-119
Bugzilla:
585094: CVE-2010-1437 kernel: keyrings: find_keyring_by_name() can gain the freed keyring

The MITRE CVE dictionary describes this issue as:

Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.

Find out more about CVE-2010-1437 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect the version of Linux kernel as shipped with Red Hat
Enterprise Linux 3. Future kernel updates in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG will address this issue.

CVSS v2 metrics

Base Score 7.2
Base Metrics AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (kernel) RHSA-2010:0504 2010-07-01
Red Hat Enterprise Linux 4 (kernel) RHSA-2010:0474 2010-06-15
MRG Grid for RHEL 5 Server (kernel-rt) RHSA-2010:0631 2010-08-17

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.