Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-0728

Опубликовано: 19 янв. 2016
Источник: redhat
CVSS2: 7.2
EPSS Средний

Описание

The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.

A use-after-free flaw was found in the way the Linux kernel's key management subsystem handled keyring object reference counting in certain error path of the join_session_keyring() function. A local, unprivileged user could use this flaw to escalate their privileges on the system.

Отчет

This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 5 and 6. Refer to https://access.redhat.com/node/2131021 for further information.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4kernelNot affected
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2016:006525.01.2016
Red Hat Enterprise Linux 7kernelFixedRHSA-2016:006425.01.2016
Red Hat Enterprise Linux 7.1 Extended Update SupportkernelFixedRHSA-2016:010302.02.2016
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2016:006826.01.2016

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1297475kernel: Possible use-after-free vulnerability in keyring facility

EPSS

Процентиль: 98%
0.55395
Средний

7.2 High

CVSS2

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 9 лет назад

The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.

CVSS3: 7.8
nvd
больше 9 лет назад

The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.

CVSS3: 7.8
debian
больше 9 лет назад

The join_session_keyring function in security/keys/process_keys.c in t ...

suse-cvrf
больше 9 лет назад

Security update for Kernel live patch 10

suse-cvrf
больше 9 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 98%
0.55395
Средний

7.2 High

CVSS2