CVE-2016-0728
Published Feb 8, 2016
Last updated 2 years ago
Overview
- Description
- The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- CWE-190: Integer Overflow or Wraparound CWE-416: Use After Free
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449" }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A" }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B" }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93" }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB" }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825" }, { "criteria": "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CD857E7-B878-49F9-BDDA-93DDEBB0B42B" }, { "criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1" }, { "criteria": "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A47AB858-36DE-4330-8CAC-1B46C5C8DA80" }, { "criteria": "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49413FF7-7910-4F74-B106-C3170612CB2A" }, { "criteria": "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2467F65-A3B7-4E45-A9A5-E5A6EFD99D7B" }, { "criteria": "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8882E50-7C49-4A99-91F2-DF979CF8BB2F" }, { "criteria": "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98C32982-095C-4628-9958-118A3D3A9CAA" }, { "criteria": "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FC0FCEA-0B3D-43C1-AB62-4F9C880B4CA1" }, { "criteria": "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC75ED04-B8C7-4CC0-AC64-AE2D9E0CDF5D" }, { "criteria": "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC13D3EE-CC89-4883-8E3D-3FE25FB8CF42" }, { "criteria": "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C4E6353-B77A-464F-B7DE-932704003B33" }, { "criteria": "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77125688-2CCA-4990-ABB2-551D47CB0CDD" }, { "criteria": "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9915371-C730-41F7-B86E-7E4DE0DF5385" }, { "criteria": "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7A8EC00-266C-409B-AD43-18E8DFCD6FE3" }, { "criteria": "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B846C63A-7261-481E-B4A4-0D8C79E0D8A7" }, { "criteria": "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1D94CDD-DE7B-444E-A3AE-AE9C9A779374" }, { "criteria": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E70C6D8D-C9C3-4D92-8DFC-71F59E068295" }, { "criteria": "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "691FA41B-C2CE-413F-ABB1-0B22CB322807" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:server_migration_pack:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E90CE198-631E-4931-9349-0287783B78BC", "versionEndIncluding": "7.5" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBA7B5CE-5867-4F25-9513-DB28B00EA345", "versionEndExcluding": "3.10.95", "versionStartIncluding": "3.8" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7AF3AA1-D6B8-4473-A781-740F7AC7A81F", "versionEndExcluding": "3.12.53", "versionStartIncluding": "3.11" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8AC651B-877B-40A1-B0FB-E13C039FBBCF", "versionEndExcluding": "3.14.59", "versionStartIncluding": "3.13" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DC4BA70-B111-4D2E-BC78-6601CED68F08", "versionEndExcluding": "3.16.35", "versionStartIncluding": "3.15" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "152B915A-F9A5-4DB5-B0B3-DBF5F092773B", "versionEndExcluding": "3.18.26", "versionStartIncluding": "3.17" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F829E177-AAF1-4509-964D-48DA8AE2C8BC", "versionEndExcluding": "4.1.16", "versionStartIncluding": "3.19" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6B89F94-302A-4313-8FE5-E3C43BD4271E", "versionEndExcluding": "4.3.4", "versionStartIncluding": "4.2" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5E05934-78CB-49ED-A2B3-1B4CBCB648AB", "versionEndExcluding": "4.4.1", "versionStartIncluding": "4.4" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "vulnerable": true, "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "vulnerable": true, "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355" } ], "operator": "OR" } ] } ]