MEDIUM · 5.5

CVE-2016-4470

The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of se...

Vulnerability Description

The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.

CVSS Score

5.5

MEDIUM

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
OracleVm Server3.3
OracleLinux5.0
LinuxLinux Kernel<= 4.6.3
NovellSuse Linux Enterprise Real Time Extension12.0
RedhatEnterprise Linux6.0
RedhatEnterprise Linux Desktop7.0
RedhatEnterprise Linux For Real Time7.0
RedhatEnterprise Linux Hpc Node7.0
RedhatEnterprise Linux Hpc Node Eus7.0
RedhatEnterprise Linux Server7.0
RedhatEnterprise Linux Server Aus7.2
RedhatEnterprise Linux Server Eus7.2
RedhatEnterprise Linux Workstation7.0
RedhatEnterprise Mrg2.0

References

FAQ

What is CVE-2016-4470?

CVE-2016-4470 is a vulnerability with a CVSS score of 5.5 (MEDIUM). The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of se...

How severe is CVE-2016-4470?

CVE-2016-4470 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-4470?

Check the references section above for vendor advisories and patch information. Affected products include: Oracle Vm Server, Oracle Linux, Linux Linux Kernel, Novell Suse Linux Enterprise Real Time Extension, Redhat Enterprise Linux.