{ "id": "CVE-2016-4470", "sourceIdentifier": "secalert@redhat.com", "published": "2016-06-27T10:59:08.720", "lastModified": "2023-02-12T23:21:21.960", "vulnStatus": "Modified", "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", "value": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command." }, { "lang": "es", "value": "La funci\u00f3n key_reject_and_link en security/keys/key.c en el kernel de Linux hasta la versi\u00f3n 4.6.3 no asegura que cierta estructura de datos est\u00e9 inicializada, lo que permite a usuarios locales provocar una denegaci\u00f3n de servicio (ca\u00edda del sistema) a trav\u00e9s de vectores involucrando un comando keyctl request2 manipulado." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C2D62B2C-40E5-41B7-9DAA-029BCD079054" }, { "vulnerable": true, "criteria": "cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "4BA58099-26F7-4B01-B9FC-275F012FE9C6" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3CCD459-9E6D-4731-8054-CDF8B58454A9" }, { "vulnerable": true, "criteria": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*", "matchCriteriaId": "CC7A498A-A669-4C42-8134-86103C799D13" }, { "vulnerable": true, "criteria": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "matchCriteriaId": "104DA87B-DEE4-4262-AE50-8E6BC43B228B" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.6.3", "matchCriteriaId": "FC099084-12C9-4396-ABC7-F389CFAD871E" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "B2905A9C-3E00-4188-8341-E5C2F62EF405" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "1BA3C94F-5FA1-4805-A3EC-6E27AE9AB10C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C84489B-B08C-4854-8A12-D01B6E45CF79" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "079318CC-8A10-401B-8BC9-8CD28C3F1797" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C8D871B-AEA1-4407-AEE3-47EC782250FF" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "44B067C7-735E-43C9-9188-7E1522A02491" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C60FA8B1-1802-4522-A088-22171DCF7A93" } ] } ] } ], "references": [ { "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=38327424b40bcebe2de92d07312c89360ac9229a", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00012.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00013.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html", "source": "secalert@redhat.com" }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-1532.html", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-1539.html", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-1541.html", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-1657.html", "source": "secalert@redhat.com" }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-2006.html", "source": "secalert@redhat.com" }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-2074.html", "source": "secalert@redhat.com" }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-2076.html", "source": "secalert@redhat.com" }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-2128.html", "source": "secalert@redhat.com" }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-2133.html", "source": "secalert@redhat.com" }, { "url": "http://www.debian.org/security/2016/dsa-3607", "source": "secalert@redhat.com" }, { "url": "http://www.openwall.com/lists/oss-security/2016/06/15/11", "source": "secalert@redhat.com" }, { "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", "source": "secalert@redhat.com" }, { "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securitytracker.com/id/1036763", "source": "secalert@redhat.com" }, { "url": "http://www.ubuntu.com/usn/USN-3049-1", "source": "secalert@redhat.com" }, { "url": "http://www.ubuntu.com/usn/USN-3050-1", "source": "secalert@redhat.com" }, { "url": "http://www.ubuntu.com/usn/USN-3051-1", "source": "secalert@redhat.com" }, { "url": "http://www.ubuntu.com/usn/USN-3052-1", "source": "secalert@redhat.com" }, { "url": "http://www.ubuntu.com/usn/USN-3053-1", "source": "secalert@redhat.com" }, { "url": "http://www.ubuntu.com/usn/USN-3054-1", "source": "secalert@redhat.com" }, { "url": "http://www.ubuntu.com/usn/USN-3055-1", "source": "secalert@redhat.com" }, { "url": "http://www.ubuntu.com/usn/USN-3056-1", "source": "secalert@redhat.com" }, { "url": "http://www.ubuntu.com/usn/USN-3057-1", "source": "secalert@redhat.com" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716", "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ] }, { "url": "https://github.com/torvalds/linux/commit/38327424b40bcebe2de92d07312c89360ac9229a", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] } ] }