The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html
http://rhn.redhat.com/errata/RHSA-2016-0064.html
http://rhn.redhat.com/errata/RHSA-2016-0065.html
http://rhn.redhat.com/errata/RHSA-2016-0068.html
http://source.android.com/security/bulletin/2016-03-01.html
http://www.debian.org/security/2016/dsa-3448
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/2
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/81054
http://www.securitytracker.com/id/1034701
http://www.ubuntu.com/usn/USN-2870-1
http://www.ubuntu.com/usn/USN-2870-2
http://www.ubuntu.com/usn/USN-2871-1
http://www.ubuntu.com/usn/USN-2871-2
http://www.ubuntu.com/usn/USN-2872-1
http://www.ubuntu.com/usn/USN-2872-2
http://www.ubuntu.com/usn/USN-2872-3
http://www.ubuntu.com/usn/USN-2873-1
https://bto.bluecoat.com/security-advisory/sa112
https://bugzilla.redhat.com/show_bug.cgi?id=1297475
https://github.com/torvalds/linux/commit/23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05018265
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
Source: MITRE
Published: 2016-02-08
Updated: 2017-11-10
Type: NVD-CWE-Other
Base Score: 7.2
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact Score: 10
Exploitability Score: 3.9
Severity: HIGH
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1.8
Severity: HIGH
OR
cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*
OR
cpe:2.3:a:hp:server_migration_pack:*:*:*:*:*:*:*:* versions up to 7.5 (inclusive)
OR
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 4.4 (inclusive)
ID | Name | Product | Family | Severity |
---|---|---|---|---|
124980 | EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1527) | Nessus | Huawei Local Security Checks | critical |
124815 | EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1491) | Nessus | Huawei Local Security Checks | critical |
99163 | OracleVM 3.3 : Unbreakable / etc (OVMSA-2017-0057) (Dirty COW) | Nessus | OracleVM Local Security Checks | critical |
89600 | Fedora 23 : kernel-4.3.3-303.fc23 (2016-b59fd603be) | Nessus | Fedora Local Security Checks | high |
89554 | Fedora 22 : kernel-4.3.4-200.fc22 (2016-5d43766e33) | Nessus | Fedora Local Security Checks | critical |
88605 | openSUSE Security Update : the Linux Kernel (openSUSE-2016-136) | Nessus | SuSE Local Security Checks | high |
88574 | RHEL 7 : kernel-rt (RHSA-2016:0065) | Nessus | Red Hat Local Security Checks | high |
88558 | RHEL 7 : kernel (RHSA-2016:0103) | Nessus | Red Hat Local Security Checks | high |
88545 | openSUSE Security Update : the Linux Kernel (openSUSE-2016-124) | Nessus | SuSE Local Security Checks | critical |
88542 | openSUSE Security Update : the Linux Kernel (openSUSE-2016-116) | Nessus | SuSE Local Security Checks | high |
88405 | RHEL 6 : MRG (RHSA-2016:0068) | Nessus | Red Hat Local Security Checks | high |
88174 | Scientific Linux Security Update : kernel on SL7.x x86_64 (20160125) | Nessus | Scientific Linux Local Security Checks | high |
88173 | RHEL 7 : kernel (RHSA-2016:0064) | Nessus | Red Hat Local Security Checks | high |
88168 | Oracle Linux 7 : kernel (ELSA-2016-0064) | Nessus | Oracle Linux Local Security Checks | high |
88148 | CentOS 7 : kernel (CESA-2016:0064) | Nessus | CentOS Local Security Checks | high |
88144 | SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2016:0205-1) | Nessus | SuSE Local Security Checks | high |
88140 | SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2016:0186-1) | Nessus | SuSE Local Security Checks | high |
88034 | OracleVM 3.3 : kernel-uek (OVMSA-2016-0005) | Nessus | OracleVM Local Security Checks | high |
88033 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2016-3510) | Nessus | Oracle Linux Local Security Checks | high |
88032 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2016-3509) | Nessus | Oracle Linux Local Security Checks | high |
88017 | Ubuntu 14.04 LTS : linux-lts-utopic vulnerability (USN-2873-1) | Nessus | Ubuntu Local Security Checks | high |
88016 | Ubuntu 15.10 : linux-raspi2 vulnerability (USN-2872-3) | Nessus | Ubuntu Local Security Checks | high |
88015 | Ubuntu 14.04 LTS : linux-lts-wily vulnerability (USN-2872-2) | Nessus | Ubuntu Local Security Checks | high |
88014 | Ubuntu 15.10 : linux vulnerability (USN-2872-1) | Nessus | Ubuntu Local Security Checks | high |
88013 | Ubuntu 14.04 LTS : linux-lts-vivid vulnerability (USN-2871-2) | Nessus | Ubuntu Local Security Checks | high |
88012 | Ubuntu 15.04 : linux vulnerability (USN-2871-1) | Nessus | Ubuntu Local Security Checks | high |
88011 | Ubuntu 12.04 LTS : linux-lts-trusty vulnerability (USN-2870-2) | Nessus | Ubuntu Local Security Checks | high |
88010 | Ubuntu 14.04 LTS : linux vulnerability (USN-2870-1) | Nessus | Ubuntu Local Security Checks | high |
87995 | Debian DSA-3448-1 : linux - security update | Nessus | Debian Local Security Checks | high |
87991 | Amazon Linux AMI : kernel (ALAS-2016-642) | Nessus | Amazon Linux Local Security Checks | high |