Vulnerability Name: | CVE-2017-17807 (CCN-136628) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2017-12-08 | ||||||||||||||||||||||||||||||||||||
Published: | 2017-12-08 | ||||||||||||||||||||||||||||||||||||
Updated: | 2019-10-03 | ||||||||||||||||||||||||||||||||||||
Summary: | The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's "default request-key keyring" via the request_key() system call, allowing a local user to use a sequence of crafted system calls to add keys to a keyring with only Search permission (not Write permission) to that keyring, related to construct_get_dest_keyring() in security/keys/request_key.c. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 3.3 Low (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) 2.9 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
2.9 Low (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-862 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-17807 Source: CONFIRM Type: Issue Tracking, Patch http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4dca6ea1d9432052afb06baf2e3ae78188a4410b Source: CCN Type: IBM Security Bulletin 794373 (PowerKVM) Vulnerabilities in the Linux Kernel affect PowerKVM Source: BID Type: Third Party Advisory, VDB Entry 102301 Source: CCN Type: BID-102301 Linux Kernel CVE-2017-17807 Local Denial of Service Vulnerability Source: XF Type: UNKNOWN linux-kernel-cve201717807-sec-bypass(136628) Source: CCN Type: Linux Kernel GIT Repository KEYS: add missing permission check for request_key() destination Source: CONFIRM Type: Issue Tracking, Patch https://github.com/torvalds/linux/commit/4dca6ea1d9432052afb06baf2e3ae78188a4410b Source: MLIST Type: UNKNOWN [debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update Source: UBUNTU Type: UNKNOWN USN-3617-1 Source: UBUNTU Type: UNKNOWN USN-3617-2 Source: UBUNTU Type: UNKNOWN USN-3617-3 Source: UBUNTU Type: UNKNOWN USN-3619-1 Source: UBUNTU Type: UNKNOWN USN-3619-2 Source: UBUNTU Type: UNKNOWN USN-3620-1 Source: UBUNTU Type: UNKNOWN USN-3620-2 Source: UBUNTU Type: UNKNOWN USN-3632-1 Source: DEBIAN Type: Third Party Advisory DSA-4073 Source: DEBIAN Type: UNKNOWN DSA-4082 Source: CCN Type: IBM Security Bulletin 6335281 (Data Risk Manager) IBM Data Risk Manager is affected by multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6601941 (QRadar Network Security) IBM QRadar Network Security is affected by multiple vulnerabilities in kernel. Source: CONFIRM Type: Issue Tracking, Mailing List, Release Notes https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.6 Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-17807 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |