vulnerability

Ubuntu: (Multiple Advisories) (CVE-2016-0728): Linux kernel vulnerability

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Jan 19, 2016
Added
Feb 7, 2016
Modified
Mar 27, 2026

Description

The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.

Solutions

ubuntu-upgrade-linux-image-3-13-0-76-genericubuntu-upgrade-linux-image-3-13-0-76-generic-lpaeubuntu-upgrade-linux-image-3-13-0-76-lowlatencyubuntu-upgrade-linux-image-3-13-0-76-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-76-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-76-powerpc-smpubuntu-upgrade-linux-image-3-13-0-76-powerpc64-embubuntu-upgrade-linux-image-3-13-0-76-powerpc64-smpubuntu-upgrade-linux-image-3-16-0-59-genericubuntu-upgrade-linux-image-3-16-0-59-generic-lpaeubuntu-upgrade-linux-image-3-16-0-59-lowlatencyubuntu-upgrade-linux-image-3-16-0-59-powerpc-e500mcubuntu-upgrade-linux-image-3-16-0-59-powerpc-smpubuntu-upgrade-linux-image-3-16-0-59-powerpc64-embubuntu-upgrade-linux-image-3-16-0-59-powerpc64-smpubuntu-upgrade-linux-image-3-19-0-47-genericubuntu-upgrade-linux-image-3-19-0-47-generic-lpaeubuntu-upgrade-linux-image-3-19-0-47-lowlatencyubuntu-upgrade-linux-image-3-19-0-47-powerpc-e500mcubuntu-upgrade-linux-image-3-19-0-47-powerpc-smpubuntu-upgrade-linux-image-3-19-0-47-powerpc64-embubuntu-upgrade-linux-image-3-19-0-47-powerpc64-smpubuntu-upgrade-linux-image-4-2-0-1020-raspi2ubuntu-upgrade-linux-image-4-2-0-25-genericubuntu-upgrade-linux-image-4-2-0-25-generic-lpaeubuntu-upgrade-linux-image-4-2-0-25-lowlatencyubuntu-upgrade-linux-image-4-2-0-25-powerpc-e500mcubuntu-upgrade-linux-image-4-2-0-25-powerpc-smpubuntu-upgrade-linux-image-4-2-0-25-powerpc64-embubuntu-upgrade-linux-image-4-2-0-25-powerpc64-smp

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.