High severity7.8NVD Advisory· Published Feb 8, 2016· Updated May 6, 2026
CVE-2016-0728
CVE-2016-0728
Description
The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
42- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdVendor Advisory
- lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.htmlnvdMailing ListThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-01/msg00026.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-02/msg00012.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.htmlnvdMailing ListThird Party Advisory
- perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/nvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-0064.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-0065.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-0068.htmlnvdThird Party Advisory
- source.android.com/security/bulletin/2016-03-01.htmlnvdVendor Advisory
- www.debian.org/security/2016/dsa-3448nvdThird Party Advisory
- www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1nvdVendor Advisory
- www.openwall.com/lists/oss-security/2016/01/19/2nvdMailing ListThird Party Advisory
- www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/81054nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1034701nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2870-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2870-2nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2871-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2871-2nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2872-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2872-2nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2872-3nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2873-1nvdThird Party Advisory
- bto.bluecoat.com/security-advisory/sa112nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
- github.com/torvalds/linux/commit/23567fd052a9abb6d67fe8e7a9ccdd9800a540f2nvdThird Party Advisory
- h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- security.netapp.com/advisory/ntap-20160211-0001/nvdThird Party Advisory
- www.exploit-db.com/exploits/39277/nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.