Severity
4.4
Medium severity
Details
- CVSS score
- 4.4
- CVSS vector
- CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
- CWE ID
Overview
About vulnerability
It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as ‘.dns_resolver’ in RHEL-7 or ‘.builtin_trusted_keys’ upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.Details
- Affected product:
- CentOS 6 , CentOS 6 ALT , CentOS 6 plus , CentOS 7 , CentOS 7 ALT , CentOS 7 plus , CloudLinux OS 6 , CloudLinux OS 6h , CloudLinux OS 7 , Debian 10 , Debian 10 cloud , Debian 8 , Debian 9 , Endurance 6 elrepo , Endurance 7 eig 3.10 , OEL 6 Dell , OEL 7 Dell , OpenVZ 6 , Oracle Linux 6 , Oracle Linux 6 ELS , Oracle Linux 7 , RHEL 6 , RHEL 7 , Scientific 6 , Ubuntu 14.04 , Ubuntu 14.04 ESM , Ubuntu 16.04 , Ubuntu 16.04 ESM , Upstream 3.16 , Upstream 3.18 , Upstream 4.4 , Upstream 4.9
- Affected packages:
- linux-azure @ - (+48 more)