The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
12 Feb 2023, 23:21
Type | Values Removed | Values Added |
---|---|---|
Summary | The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command. | |
References |
|
02 Feb 2023, 21:16
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:* | |
Summary | A flaw was found in the Linux kernel's keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation. | |
References |
|
Information
Published : 2016-06-27 10:59
Updated : 2023-12-10 11:46
NVD link : CVE-2016-4470
Mitre link : CVE-2016-4470
CVE.ORG link : CVE-2016-4470
JSON object : View
Products Affected
oracle
- vm_server
- linux
redhat
- enterprise_linux_hpc_node
- enterprise_linux_server_aus
- enterprise_linux_hpc_node_eus
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_server
- enterprise_linux
- enterprise_mrg
- enterprise_linux_for_real_time
- enterprise_linux_server_eus
novell
- suse_linux_enterprise_real_time_extension
linux
- linux_kernel
CWE