Vulnerability CVE-2016-0728: Information

Description

The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.

Severity: HIGH (7.8) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Published: Feb. 8, 2016
Modified: Feb. 13, 2023

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
kernel-image-std-defsisyphus4.1.15-alt26.1.91-alt1ALT-PU-2016-1042-1156202Fixed
kernel-image-std-defp104.1.15-alt25.10.216-alt1ALT-PU-2016-1042-1156202Fixed
kernel-image-std-defp94.1.15-alt25.4.275-alt1ALT-PU-2016-1042-1156202Fixed
kernel-image-std-defc9f24.1.15-alt25.10.214-alt0.c9f.2ALT-PU-2016-1042-1156202Fixed
kernel-image-std-defc73.14.59-alt1.M70C.34.4.277-alt0.M70C.1ALT-PU-2016-1071-1157034Fixed
kernel-image-std-paec9f24.1.15-alt24.19.72-alt1ALT-PU-2016-1043-1156203Fixed
kernel-image-un-defsisyphus4.4.0-alt26.6.31-alt1ALT-PU-2016-1040-1156143Fixed
kernel-image-un-defp104.4.0-alt26.1.85-alt1ALT-PU-2016-1040-1156143Fixed
kernel-image-un-defp94.4.0-alt25.10.216-alt2ALT-PU-2016-1040-1156143Fixed
kernel-image-un-defc10f14.4.0-alt26.1.85-alt0.c10f.1ALT-PU-2016-1040-1156143Fixed
kernel-image-un-defc9f24.4.0-alt25.10.29-alt2ALT-PU-2016-1040-1156143Fixed
kernel-image-un-defc74.4.19-alt0.M70C.14.9.277-alt0.M70C.1ALT-PU-2016-1923-1168838Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
[oss-security] 20160119 Linux kernel: use after free in keyring facility.
  • Mailing List
  • Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1297475
  • Issue Tracking
  • Third Party Advisory
https://github.com/torvalds/linux/commit/23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
  • Third Party Advisory
http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
  • Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
  • Vendor Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
  • Vendor Advisory
http://source.android.com/security/bulletin/2016-03-01.html
  • Vendor Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
  • Third Party Advisory
HPSBHF03436
  • Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
  • Third Party Advisory
81054
  • Third Party Advisory
  • VDB Entry
SUSE-SU-2016:0757
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:0756
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:0755
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:0747
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:0746
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:0745
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:0752
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:0753
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:0750
  • Mailing List
  • Third Party Advisory
https://bto.bluecoat.com/security-advisory/sa112
  • Third Party Advisory
SUSE-SU-2016:0751
  • Mailing List
  • Third Party Advisory
RHSA-2016:0065
  • Third Party Advisory
FEDORA-2016-5d43766e33
  • Mailing List
  • Third Party Advisory
USN-2870-2
  • Third Party Advisory
USN-2872-1
  • Third Party Advisory
RHSA-2016:0068
  • Third Party Advisory
DSA-3448
  • Third Party Advisory
SUSE-SU-2016:0341
  • Mailing List
  • Third Party Advisory
USN-2872-3
  • Third Party Advisory
RHSA-2016:0064
  • Third Party Advisory
USN-2871-2
  • Third Party Advisory
USN-2870-1
  • Third Party Advisory
USN-2873-1
  • Third Party Advisory
FEDORA-2016-b59fd603be
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:0205
  • Mailing List
  • Third Party Advisory
USN-2871-1
  • Third Party Advisory
39277
  • Third Party Advisory
  • VDB Entry
USN-2872-2
  • Third Party Advisory
1034701
  • Third Party Advisory
  • VDB Entry
https://security.netapp.com/advisory/ntap-20160211-0001/
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*

      cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*

      Configuration 2

      cpe:2.3:a:hp:server_migration_pack:*:*:*:*:*:*:*:*
      End including
      7.5

      Configuration 3

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.15
      End excliding
      3.16.35

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.11
      End excliding
      3.12.53

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.8
      End excliding
      3.10.95

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.13
      End excliding
      3.14.59

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.17
      End excliding
      3.18.26

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.19
      End excliding
      4.1.16

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      4.2
      End excliding
      4.3.4

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      4.4
      End excliding
      4.4.1

      Configuration 4

      cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

      Configuration 5

      cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*