CVE-2016-0728

Impact:
Important
Public Date:
2016-01-19
CWE:
CWE-416
Bugzilla:
1297475: CVE-2016-0728 kernel: Possible use-after-free vulnerability in keyring facility
A use-after-free flaw was found in the way the Linux kernel's key management subsystem handled keyring object reference counting in certain error path of the join_session_keyring() function. A local, unprivileged user could use this flaw to escalate their privileges on the system.

Find out more about CVE-2016-0728 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 5 and 6.

Refer to https://access.redhat.com/node/2131021 for further information.

CVSS v2 metrics

Base Score 7.2
Base Metrics AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux Extended Update Support 7.1 (kernel) RHSA-2016:0103 2016-02-02
MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2016:0068 2016-01-26
Red Hat Enterprise Linux 7 (kernel) RHSA-2016:0064 2016-01-25
Red Hat Enterprise Linux for Real Time for NFV (v. 7) (kernel-rt) RHSA-2016:0065 2016-01-25

Affected Packages State

Platform Package State
Red Hat Enterprise MRG 2 realtime-kernel Affected
Red Hat Enterprise Linux 6 kernel Not affected
Red Hat Enterprise Linux 5 kernel Not affected
Red Hat Enterprise Linux 4 kernel Not affected

Acknowledgements

Red Hat would like to thank the Perception Point research team for reporting this issue.

External References

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.