Name | CVE-2016-0728 |
Description | The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more) |
References | DSA-3448-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
linux (PTS) | buster | 4.19.249-2 | fixed |
buster (security) | 4.19.282-1 | fixed | |
bullseye | 5.10.178-3 | fixed | |
bullseye (security) | 5.10.179-1 | fixed | |
bookworm, sid | 6.1.27-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
linux | source | wheezy | (not affected) | |||
linux | source | jessie | 3.16.7-ckt20-1+deb8u3 | DSA-3448-1 | ||
linux | source | (unstable) | 4.3.3-6 | |||
linux-2.6 | source | (unstable) | (not affected) |
[wheezy] - linux <not-affected> (Introduced in v3.8-rc1)
- linux-2.6 <not-affected> (Introduced in v3.8-rc1)
Upstream commit: https://git.kernel.org/linus/23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
Introduced in https://git.kernel.org/linus/3a50597de8635cd05133bd12c95681c82fe7b878 (v3.8-rc1)
http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/