CVE-2016-3134

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

Published : 2016-04-27 17:59 Updated : 2018-01-05 02:30

7.2
CVSS Score More info
Score 7.2 / 10
7.2
Vendor Product Version URI
Novell Suse Linux Enterprise Debuginfo 11.0 cpe:/o:novell:suse_linux_enterprise_debuginfo:11.0:sp4
Novell Suse Linux Enterprise Server 12.0 cpe:/o:novell:suse_linux_enterprise_server:12.0
Novell Suse Linux Enterprise Server 12.0 cpe:/o:novell:suse_linux_enterprise_server:12.0:sp1
Novell Suse Linux Enterprise Real Time Extension 12.0 cpe:/o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1
Novell Suse Linux Enterprise Server 11.0 cpe:/o:novell:suse_linux_enterprise_server:11.0:extra
Novell Suse Linux Enterprise Server 11.0 cpe:/o:novell:suse_linux_enterprise_server:11.0:sp4
Novell Suse Linux Enterprise Live Patching 12.0 cpe:/o:novell:suse_linux_enterprise_live_patching:12.0
Novell Suse Linux Enterprise Workstation Extension 12.0 cpe:/o:novell:suse_linux_enterprise_workstation_extension:12.0
Novell Suse Linux Enterprise Module For Public Cloud 12.0 cpe:/o:novell:suse_linux_enterprise_module_for_public_cloud:12.0
Novell Suse Linux Enterprise Software Development Kit 11.0 cpe:/o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4
Novell Suse Linux Enterprise Workstation Extension 12.0 cpe:/o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1
Linux Linux Kernel 4.5.2 cpe:/o:linux:linux_kernel:4.5.2
Novell Suse Linux Enterprise Desktop 12.0 cpe:/o:novell:suse_linux_enterprise_desktop:12.0:sp1
Novell Suse Linux Enterprise Software Development Kit 12.0 cpe:/o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1
Novell Suse Linux Enterprise Desktop 12.0 cpe:/o:novell:suse_linux_enterprise_desktop:12.0
Novell Suse Linux Enterprise Software Development Kit 12.0 cpe:/o:novell:suse_linux_enterprise_software_development_kit:12.0
  1. Novell (8) Search CVE
    1. Suse Linux Enterprise Desktop (1) Search CVE
      1. 12.0
    2. Suse Linux Enterprise Live Patching (1) Search CVE
      1. 12.0
    3. Suse Linux Enterprise Server (2) Search CVE
      1. 12.0
      2. 11.0
    4. Suse Linux Enterprise Debuginfo (1) Search CVE
      1. 11.0
    5. Suse Linux Enterprise Workstation Extension (1) Search CVE
      1. 12.0
    6. Suse Linux Enterprise Software Development Kit (2) Search CVE
      1. 11.0
      2. 12.0
    7. Suse Linux Enterprise Real Time Extension (1) Search CVE
      1. 12.0
    8. Suse Linux Enterprise Module For Public Cloud (1) Search CVE
      1. 12.0
  2. Linux (1) Search CVE
    1. Linux Kernel (1) Search CVE
      1. 4.5.2

CWE

ID Name Description Links
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. CVE

References

Source Link
CONFIRM http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54d83fc74aa9ec72794373cb47432c5f7fb1a309
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
DEBIAN http://www.debian.org/security/2016/dsa-3607
CONFIRM http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
CONFIRM http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
CONFIRM http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
BID http://www.securityfocus.com/bid/84305
UBUNTU http://www.ubuntu.com/usn/USN-2929-1
UBUNTU http://www.ubuntu.com/usn/USN-2929-2
UBUNTU http://www.ubuntu.com/usn/USN-2930-1
UBUNTU http://www.ubuntu.com/usn/USN-2930-2
UBUNTU http://www.ubuntu.com/usn/USN-2930-3
UBUNTU http://www.ubuntu.com/usn/USN-2931-1
UBUNTU http://www.ubuntu.com/usn/USN-2932-1
UBUNTU http://www.ubuntu.com/usn/USN-3049-1
UBUNTU http://www.ubuntu.com/usn/USN-3050-1
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1317383
MISC https://code.google.com/p/google-security-research/issues/detail?id=758
CONFIRM https://github.com/torvalds/linux/commit/54d83fc74aa9ec72794373cb47432c5f7fb1a309
SECTRACK http://www.securitytracker.com/id/1036763
REDHAT http://rhn.redhat.com/errata/RHSA-2016-1847.html
REDHAT http://rhn.redhat.com/errata/RHSA-2016-1875.html
REDHAT http://rhn.redhat.com/errata/RHSA-2016-1883.html