The keyrejectand_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-4470.json"
[
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"239415392035887708406515296023627009615",
"258233288389945452499074849492714821540",
"79147142035672848401463966725935439746",
"108711496445572938335565040560164047505"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@38327424b40bcebe2de92d07312c89360ac9229a",
"id": "CVE-2016-4470-92a49341",
"target": {
"file": "security/keys/key.c"
}
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"length": 1144.0,
"function_hash": "122964952574080354260693864750481484203"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@38327424b40bcebe2de92d07312c89360ac9229a",
"id": "CVE-2016-4470-a80c40dd",
"target": {
"file": "security/keys/key.c",
"function": "key_reject_and_link"
}
}
]