CVE Vulnerabilities

CVE-2016-0728

Published: Feb 08, 2016 | Modified: Apr 12, 2025
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
7.2 IMPORTANT
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V3
Ubuntu
HIGH
root.io logo minimus.io logo echo.ai logo

The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.

Affected Software

NameVendorStart VersionEnd Version
AndroidGoogle4.0 (including)4.0 (including)
AndroidGoogle4.0.1 (including)4.0.1 (including)
AndroidGoogle4.0.2 (including)4.0.2 (including)
AndroidGoogle4.0.3 (including)4.0.3 (including)
AndroidGoogle4.0.4 (including)4.0.4 (including)
AndroidGoogle4.1 (including)4.1 (including)
AndroidGoogle4.1.2 (including)4.1.2 (including)
AndroidGoogle4.2 (including)4.2 (including)
AndroidGoogle4.2.1 (including)4.2.1 (including)
AndroidGoogle4.2.2 (including)4.2.2 (including)
AndroidGoogle4.3 (including)4.3 (including)
AndroidGoogle4.3.1 (including)4.3.1 (including)
AndroidGoogle4.4 (including)4.4 (including)
AndroidGoogle4.4.1 (including)4.4.1 (including)
AndroidGoogle4.4.2 (including)4.4.2 (including)
AndroidGoogle4.4.3 (including)4.4.3 (including)
AndroidGoogle5.0 (including)5.0 (including)
AndroidGoogle5.0.1 (including)5.0.1 (including)
AndroidGoogle5.0.2 (including)5.0.2 (including)
AndroidGoogle5.1 (including)5.1 (including)
AndroidGoogle5.1.0 (including)5.1.0 (including)
AndroidGoogle5.1.1 (including)5.1.1 (including)
AndroidGoogle6.0 (including)6.0 (including)
AndroidGoogle6.0.1 (including)6.0.1 (including)
Red Hat Enterprise Linux 7RedHatkernel-rt-0:3.10.0-327.4.5.rt56.206.el7_2*
Red Hat Enterprise Linux 7RedHatkernel-0:3.10.0-327.4.5.el7*
Red Hat Enterprise Linux 7.1 Extended Update SupportRedHatkernel-0:3.10.0-229.26.2.ael7b*
Red Hat Enterprise MRG 2RedHatkernel-rt-1:3.10.0-327.rt56.170.el6rt*
LinuxUbuntuesm-infra-legacy/trusty*
LinuxUbuntutrusty*
LinuxUbuntutrusty/esm*
LinuxUbuntuupstream*
LinuxUbuntuvivid*
LinuxUbuntuvivid/ubuntu-core*
LinuxUbuntuwily*
Linux-armadaxpUbuntuupstream*
Linux-awsUbuntuupstream*
Linux-floUbuntutrusty*
Linux-floUbuntuupstream*
Linux-fsl-imx51Ubuntuupstream*
Linux-gkeUbuntuupstream*
Linux-goldfishUbuntutrusty*
Linux-goldfishUbuntuupstream*
Linux-grouperUbuntutrusty*
Linux-grouperUbuntuupstream*
Linux-hweUbuntuupstream*
Linux-hwe-edgeUbuntuupstream*
Linux-linaro-omapUbuntuprecise*
Linux-linaro-omapUbuntuupstream*
Linux-linaro-sharedUbuntuprecise*
Linux-linaro-sharedUbuntuupstream*
Linux-linaro-vexpressUbuntuprecise*
Linux-linaro-vexpressUbuntuupstream*
Linux-lts-quantalUbuntuprecise*
Linux-lts-quantalUbuntuupstream*
Linux-lts-raringUbuntuprecise*
Linux-lts-raringUbuntuupstream*
Linux-lts-saucyUbuntuprecise*
Linux-lts-saucyUbuntuupstream*
Linux-lts-trustyUbuntuprecise*
Linux-lts-trustyUbuntuupstream*
Linux-lts-utopicUbuntutrusty*
Linux-lts-utopicUbuntuupstream*
Linux-lts-vividUbuntutrusty*
Linux-lts-vividUbuntuupstream*
Linux-lts-wilyUbuntutrusty*
Linux-lts-wilyUbuntuupstream*
Linux-lts-xenialUbuntuupstream*
Linux-maguroUbuntutrusty*
Linux-maguroUbuntuupstream*
Linux-makoUbuntutrusty*
Linux-makoUbuntuupstream*
Linux-mantaUbuntutrusty*
Linux-mantaUbuntuupstream*
Linux-qcm-msmUbuntuprecise*
Linux-qcm-msmUbuntuupstream*
Linux-raspi2Ubuntuupstream*
Linux-raspi2Ubuntuvivid/ubuntu-core*
Linux-raspi2Ubuntuwily*
Linux-snapdragonUbuntuupstream*
Linux-ti-omap4Ubuntuupstream*

References