security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192.
[
{
"id": "CVE-2017-15274-d1a19ced",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"42136334794888587879688282803088990977",
"84071034340117340578038980037887315022",
"146560975641903291492927191607933494602",
"241343473597332359757186926023696806865",
"212439901162016059223494715641646214163",
"4806945568509382516594056891607847603",
"308607159008023162253291406455586761128",
"207280117679093630959183144865158976379"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@5649645d725c73df4302428ee4e02c869248b4c5",
"signature_type": "Line",
"target": {
"file": "security/keys/keyctl.c"
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-15274.json"