CVE-2016-8650

The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5527fffff3f002b0a6b376163613b82f69de073 Issue Tracking Patch Vendor Advisory
http://seclists.org/fulldisclosure/2016/Nov/76 Mailing List
http://www.openwall.com/lists/oss-security/2016/11/24/8 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/94532
http://www.securitytracker.com/id/1037968
https://access.redhat.com/errata/RHSA-2017:0931
https://access.redhat.com/errata/RHSA-2017:0932
https://access.redhat.com/errata/RHSA-2017:0933
https://access.redhat.com/errata/RHSA-2018:1854
https://bugzilla.redhat.com/show_bug.cgi?id=1395187 Issue Tracking
https://github.com/torvalds/linux/commit/f5527fffff3f002b0a6b376163613b82f69de073 Issue Tracking Patch Third Party Advisory
https://source.android.com/security/bulletin/2017-03-01.html
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5527fffff3f002b0a6b376163613b82f69de073 Issue Tracking Patch Vendor Advisory
http://seclists.org/fulldisclosure/2016/Nov/76 Mailing List
http://www.openwall.com/lists/oss-security/2016/11/24/8 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/94532
http://www.securitytracker.com/id/1037968
https://access.redhat.com/errata/RHSA-2017:0931
https://access.redhat.com/errata/RHSA-2017:0932
https://access.redhat.com/errata/RHSA-2017:0933
https://access.redhat.com/errata/RHSA-2018:1854
https://bugzilla.redhat.com/show_bug.cgi?id=1395187 Issue Tracking
https://github.com/torvalds/linux/commit/f5527fffff3f002b0a6b376163613b82f69de073 Issue Tracking Patch Third Party Advisory
https://source.android.com/security/bulletin/2017-03-01.html
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:59

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5527fffff3f002b0a6b376163613b82f69de073 - Issue Tracking, Patch, Vendor Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5527fffff3f002b0a6b376163613b82f69de073 - Issue Tracking, Patch, Vendor Advisory
References () http://seclists.org/fulldisclosure/2016/Nov/76 - Mailing List () http://seclists.org/fulldisclosure/2016/Nov/76 - Mailing List
References () http://www.openwall.com/lists/oss-security/2016/11/24/8 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/11/24/8 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/94532 - () http://www.securityfocus.com/bid/94532 -
References () http://www.securitytracker.com/id/1037968 - () http://www.securitytracker.com/id/1037968 -
References () https://access.redhat.com/errata/RHSA-2017:0931 - () https://access.redhat.com/errata/RHSA-2017:0931 -
References () https://access.redhat.com/errata/RHSA-2017:0932 - () https://access.redhat.com/errata/RHSA-2017:0932 -
References () https://access.redhat.com/errata/RHSA-2017:0933 - () https://access.redhat.com/errata/RHSA-2017:0933 -
References () https://access.redhat.com/errata/RHSA-2018:1854 - () https://access.redhat.com/errata/RHSA-2018:1854 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1395187 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1395187 - Issue Tracking
References () https://github.com/torvalds/linux/commit/f5527fffff3f002b0a6b376163613b82f69de073 - Issue Tracking, Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/f5527fffff3f002b0a6b376163613b82f69de073 - Issue Tracking, Patch, Third Party Advisory
References () https://source.android.com/security/bulletin/2017-03-01.html - () https://source.android.com/security/bulletin/2017-03-01.html -

Information

Published : 2016-11-28 03:59

Updated : 2024-11-21 02:59


NVD link : CVE-2016-8650

Mitre link : CVE-2016-8650

CVE.ORG link : CVE-2016-8650


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-20

Improper Input Validation

CWE-399

Resource Management Errors