Upstream information

CVE-2014-0102 at MITRE

Description

The keyring_detect_cycle_iterator function in security/keys/keyring.c in the Linux kernel through 3.13.6 does not properly determine whether keyrings are identical, which allows local users to cause a denial of service (OOPS) via crafted keyctl commands.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5.2
Vector AV:A/AC:M/Au:S/C:N/I:N/A:C
Access Vector Adjacent Network
Access Complexity Medium
Authentication Single
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete

Note from the SUSE Security Team

This problem was introduced with Linux Kernel 3.14. So it does not affect SUSE Linux Enterprise 11 or older products.

SUSE Bugzilla entries: 1066001 [RESOLVED / FIXED], 866842 [RESOLVED / FIXED]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 12
  • kernel-default >= 3.12.28-4.6
  • kernel-default-devel >= 3.12.28-4.6
  • kernel-default-extra >= 3.12.28-4.6
  • kernel-devel >= 3.12.28-4.6
  • kernel-macros >= 3.12.28-4.6
  • kernel-source >= 3.12.28-4.6
  • kernel-syms >= 3.12.28-4.6
  • kernel-xen >= 3.12.28-4.6
  • kernel-xen-devel >= 3.12.28-4.6
Patchnames:
SUSE Linux Enterprise Desktop 12 GA kernel-default
SUSE Linux Enterprise Desktop 12 SP1
  • kernel-default >= 3.12.49-11.1
  • kernel-default-devel >= 3.12.49-11.1
  • kernel-default-extra >= 3.12.49-11.1
  • kernel-devel >= 3.12.49-11.1
  • kernel-macros >= 3.12.49-11.1
  • kernel-source >= 3.12.49-11.1
  • kernel-syms >= 3.12.49-11.1
  • kernel-xen >= 3.12.49-11.1
  • kernel-xen-devel >= 3.12.49-11.1
Patchnames:
SUSE Linux Enterprise Desktop 12 SP1 GA kernel-default
SUSE Linux Enterprise Server 12
  • kernel-default >= 3.12.28-4.6
  • kernel-default-base >= 3.12.28-4.6
  • kernel-default-devel >= 3.12.28-4.6
  • kernel-default-man >= 3.12.28-4.6
  • kernel-devel >= 3.12.28-4.6
  • kernel-macros >= 3.12.28-4.6
  • kernel-source >= 3.12.28-4.6
  • kernel-syms >= 3.12.28-4.6
  • kernel-xen >= 3.12.28-4.6
  • kernel-xen-base >= 3.12.28-4.6
  • kernel-xen-devel >= 3.12.28-4.6
Patchnames:
SUSE Linux Enterprise Server 12 GA kernel-default
SUSE Linux Enterprise Server 12 SP1
  • kernel-default >= 3.12.49-11.1
  • kernel-default-base >= 3.12.49-11.1
  • kernel-default-devel >= 3.12.49-11.1
  • kernel-default-man >= 3.12.49-11.1
  • kernel-devel >= 3.12.49-11.1
  • kernel-macros >= 3.12.49-11.1
  • kernel-source >= 3.12.49-11.1
  • kernel-syms >= 3.12.49-11.1
  • kernel-xen >= 3.12.49-11.1
  • kernel-xen-base >= 3.12.49-11.1
  • kernel-xen-devel >= 3.12.49-11.1
Patchnames:
SUSE Linux Enterprise Server 12 SP1 GA kernel-default
SUSE Linux Enterprise Software Development Kit 12
  • kernel-docs >= 3.12.28-4.6
  • kernel-obs-build >= 3.12.28-4.3
  • kernel-zfcpdump >= 3.12.28-4.2
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 GA kernel-docs
SUSE Linux Enterprise Software Development Kit 12 SP1
  • kernel-docs >= 3.12.49-11.1
  • kernel-obs-build >= 3.12.49-11.2
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 SP1 GA kernel-docs
SUSE Linux Enterprise Workstation Extension 12
  • kernel-default-extra >= 3.12.28-4.6
Patchnames:
SUSE Linux Enterprise Workstation Extension 12 GA kernel-default-extra
SUSE Linux Enterprise Workstation Extension 12 SP1
  • kernel-default-extra >= 3.12.49-11.1
Patchnames:
SUSE Linux Enterprise Workstation Extension 12 SP1 GA kernel-default-extra