The keyctlreadkey function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.
[
{
"id": "CVE-2017-12192-6a0cca8f",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"321906426887645753687341911948172980644",
"218696345072306355603821862751186104572",
"99741466481530107125702613242786180012"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@37863c43b2c6464f252862bf2e9768264e961678",
"signature_type": "Line",
"target": {
"file": "security/keys/keyctl.c"
}
},
{
"id": "CVE-2017-12192-b1f0cc99",
"signature_version": "v1",
"digest": {
"function_hash": "169612785481211526277317729384490498497",
"length": 660.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@37863c43b2c6464f252862bf2e9768264e961678",
"signature_type": "Function",
"target": {
"file": "security/keys/keyctl.c",
"function": "keyctl_read_key"
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-12192.json"