3.3 Low
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:N/I:P/A:N
kernel is vulnerable to authorization bypass. The vulnerability exists through missing permissions check for request_key() destination allows local attackers to add keys to keyring without Write permission.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4dca6ea1d9432052afb06baf2e3ae78188a4410b
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4dca6ea1d9432052afb06baf2e3ae78188a4410b
www.securityfocus.com/bid/102301
www.securityfocus.com/bid/102301
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index
access.redhat.com/errata/RHSA-2020:1016
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1507149
bugzilla.redhat.com/show_bug.cgi?id=1651706
bugzilla.redhat.com/show_bug.cgi?id=1694201
bugzilla.redhat.com/show_bug.cgi?id=1702264
bugzilla.redhat.com/show_bug.cgi?id=1711520
bugzilla.redhat.com/show_bug.cgi?id=1733347
bugzilla.redhat.com/show_bug.cgi?id=1749390
bugzilla.redhat.com/show_bug.cgi?id=1750577
bugzilla.redhat.com/show_bug.cgi?id=1757325
bugzilla.redhat.com/show_bug.cgi?id=1757872
bugzilla.redhat.com/show_bug.cgi?id=1758001
bugzilla.redhat.com/show_bug.cgi?id=1760294
bugzilla.redhat.com/show_bug.cgi?id=1770404
github.com/torvalds/linux/commit/4dca6ea1d9432052afb06baf2e3ae78188a4410b
github.com/torvalds/linux/commit/4dca6ea1d9432052afb06baf2e3ae78188a4410b
lists.debian.org/debian-lts-announce/2018/01/msg00004.html
lists.debian.org/debian-lts-announce/2018/01/msg00004.html
usn.ubuntu.com/3617-1/
usn.ubuntu.com/3617-1/
usn.ubuntu.com/3617-2/
usn.ubuntu.com/3617-2/
usn.ubuntu.com/3617-3/
usn.ubuntu.com/3617-3/
usn.ubuntu.com/3619-1/
usn.ubuntu.com/3619-1/
usn.ubuntu.com/3619-2/
usn.ubuntu.com/3619-2/
usn.ubuntu.com/3620-1/
usn.ubuntu.com/3620-1/
usn.ubuntu.com/3620-2/
usn.ubuntu.com/3620-2/
usn.ubuntu.com/3632-1/
usn.ubuntu.com/3632-1/
www.debian.org/security/2017/dsa-4073
www.debian.org/security/2017/dsa-4073
www.debian.org/security/2018/dsa-4082
www.debian.org/security/2018/dsa-4082
www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.6
www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.6
3.3 Low
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:N/I:P/A:N