Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-4470

Опубликовано: 15 июн. 2016
Источник: redhat
CVSS3: 7.8
CVSS2: 6.9

Описание

The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.

A flaw was found in the Linux kernel's keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation.

Отчет

This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 6 and may be addressed in a future update. This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 as the due updates to fix this issue have been shipped now.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux Extended Update Support 6.2kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2016:200604.10.2016
Red Hat Enterprise Linux 6.4 Advanced Update SupportkernelFixedRHSA-2016:213301.11.2016
Red Hat Enterprise Linux 6.5 Advanced Update SupportkernelFixedRHSA-2016:207418.10.2016
Red Hat Enterprise Linux 6.6 Extended Update SupportkernelFixedRHSA-2016:212831.10.2016
Red Hat Enterprise Linux 6.7 Extended Update SupportkernelFixedRHSA-2016:207618.10.2016
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2016:154102.08.2016
Red Hat Enterprise Linux 7kernelFixedRHSA-2016:153902.08.2016
Red Hat Enterprise Linux 7.1 Extended Update SupportkernelFixedRHSA-2016:165723.08.2016

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-253
https://bugzilla.redhat.com/show_bug.cgi?id=1341716kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path

7.8 High

CVSS3

6.9 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 9 лет назад

The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.

CVSS3: 5.5
nvd
почти 9 лет назад

The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.

CVSS3: 5.5
debian
почти 9 лет назад

The key_reject_and_link function in security/keys/key.c in the Linux k ...

suse-cvrf
почти 9 лет назад

Security update for Linux Kernel Live Patch 14 for SLE 12

suse-cvrf
почти 9 лет назад

Security update for Linux Kernel Live Patch 15 for SLE 12

7.8 High

CVSS3

6.9 Medium

CVSS2

Уязвимость CVE-2016-4470