Vigil@nce - Linux kernel: use after free via key_reject_and_link
July 2016 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can force the usage of a freed memory area via
key_reject_and_link of the Linux kernel, in order to trigger a
denial of service, and possibly to run code.
Impacted products: Debian, Fedora, Linux.
Severity: 1/4.
Creation date: 16/06/2016.
DESCRIPTION OF THE VULNERABILITY
The Linux kernel can manage cryptographic keys.
However, when the registration of a key fails, an uninitialized
variable is used, which lead to early freeing a of a memory area
which will be reused.
An attacker can therefore force the usage of a freed memory area
via key_reject_and_link of the Linux kernel, in order to trigger a
denial of service, and possibly to run code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/Linux-kernel-use-after-free-via-key-reject-and-link-19912