The key_replace_session_keyring function in security/keys/process_keys.c in the Linux kernel before 2.6.39.1 does not initialize a certain structure member, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a KEYCTL_SESSION_TO_PARENT argument to the keyctl function, a different vulnerability than CVE-2010-2960.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | * | 2.6.39.1 (excluding) |
Linux | Ubuntu | upstream | * |
Linux-ec2 | Ubuntu | maverick | * |
Linux-ec2 | Ubuntu | upstream | * |
Linux-flo | Ubuntu | upstream | * |
Linux-fsl-imx51 | Ubuntu | upstream | * |
Linux-goldfish | Ubuntu | saucy | * |
Linux-goldfish | Ubuntu | upstream | * |
Linux-grouper | Ubuntu | saucy | * |
Linux-grouper | Ubuntu | upstream | * |
Linux-lts-backport-maverick | Ubuntu | upstream | * |
Linux-lts-backport-natty | Ubuntu | upstream | * |
Linux-maguro | Ubuntu | saucy | * |
Linux-maguro | Ubuntu | upstream | * |
Linux-mako | Ubuntu | saucy | * |
Linux-mako | Ubuntu | upstream | * |
Linux-manta | Ubuntu | saucy | * |
Linux-manta | Ubuntu | upstream | * |
Linux-mvl-dove | Ubuntu | upstream | * |
Linux-ti-omap4 | Ubuntu | upstream | * |