5.5
CVSSv3

CVE-2016-4470

Published: 27/06/2016 Updated: 12/02/2023
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 437
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The key_reject_and_link function in security/keys/key.c in the Linux kernel up to and including 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle vm server 3.4

oracle vm server 3.3

oracle linux 5.0

oracle linux 6

oracle linux 7

linux linux kernel

novell suse linux enterprise real time extension 12.0

redhat enterprise linux desktop 7.0

redhat enterprise linux server aus 7.2

redhat enterprise linux workstation 7.0

redhat enterprise linux 6.0

redhat enterprise linux server 7.0

redhat enterprise linux hpc node 7.0

redhat enterprise linux server eus 7.2

redhat enterprise linux hpc node eus 7.0

redhat enterprise linux for real time 7.0

redhat enterprise mrg 2.0

Vendor Advisories

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2015-7515, CVE-2016-2184, CVE-2016-2185, CVE-2016-2186, CVE-2016-2187, CVE-2016-3136, CVE-2016-3137, CVE-2016-3138, CVE-2016-3140 Ralf Spenneberg of OpenSource Sec ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 65 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabili ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 67 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: kernel security and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 66 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnera ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 64 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
It was found that nfsd is missing permissions check when setting ACL on files, this may allow a local users to gain access to any file by setting a crafted ACL (CVE-2016-1237) A flaw was found in the Linux kernel's keyring handling code, where in key_reject_and_link() an uninitialised variable would eventually lead to arbitrary free address which ...
A flaw was found in the Linux kernel's keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...

References

NVD-CWE-Otherhttp://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=38327424b40bcebe2de92d07312c89360ac9229ahttps://bugzilla.redhat.com/show_bug.cgi?id=1341716https://github.com/torvalds/linux/commit/38327424b40bcebe2de92d07312c89360ac9229ahttp://www.openwall.com/lists/oss-security/2016/06/15/11http://rhn.redhat.com/errata/RHSA-2016-1532.htmlhttp://rhn.redhat.com/errata/RHSA-2016-1541.htmlhttp://rhn.redhat.com/errata/RHSA-2016-1539.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.htmlhttp://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.htmlhttp://www.ubuntu.com/usn/USN-3052-1http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.htmlhttp://rhn.redhat.com/errata/RHSA-2016-1657.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00012.htmlhttp://www.ubuntu.com/usn/USN-3055-1http://www.debian.org/security/2016/dsa-3607http://www.ubuntu.com/usn/USN-3050-1http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.htmlhttp://www.ubuntu.com/usn/USN-3049-1http://www.ubuntu.com/usn/USN-3053-1http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00013.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.htmlhttp://www.ubuntu.com/usn/USN-3056-1http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.htmlhttp://www.ubuntu.com/usn/USN-3057-1http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.htmlhttp://www.ubuntu.com/usn/USN-3051-1http://www.ubuntu.com/usn/USN-3054-1http://www.securitytracker.com/id/1036763http://rhn.redhat.com/errata/RHSA-2016-2133.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2128.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2076.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2074.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2006.htmlhttps://nvd.nist.govhttps://www.debian.org/security/./dsa-3607https://usn.ubuntu.com/3052-1/