CVE-2016-4997

The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.

Published : 2016-07-03 21:59 Updated : 2018-01-05 02:30

7.2
CVSS Score More info
Score 7.2 / 10
7.2
Vendor Product Version URI
Canonical Ubuntu Linux 12.04 cpe:/o:canonical:ubuntu_linux:12.04::~~lts~~~
Novell Suse Linux Enterprise Server 12.0 cpe:/o:novell:suse_linux_enterprise_server:12.0
Canonical Ubuntu Linux 16.04 cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~
Novell Suse Linux Enterprise Server 12.0 cpe:/o:novell:suse_linux_enterprise_server:12.0:sp1
Novell Suse Linux Enterprise Real Time Extension 12.0 cpe:/o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1
Canonical Ubuntu Linux 14.04 cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~
Novell Suse Linux Enterprise Live Patching 12.0 cpe:/o:novell:suse_linux_enterprise_live_patching:12.0
Novell Suse Linux Enterprise Workstation Extension 12.0 cpe:/o:novell:suse_linux_enterprise_workstation_extension:12.0
Novell Suse Linux Enterprise Module For Public Cloud 12.0 cpe:/o:novell:suse_linux_enterprise_module_for_public_cloud:12.0
Canonical Ubuntu Linux 15.10 cpe:/o:canonical:ubuntu_linux:15.10
Linux Linux Kernel 4.6.2 cpe:/o:linux:linux_kernel:4.6.2
Novell Suse Linux Enterprise Workstation Extension 12.0 cpe:/o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1
Oracle Linux 7.0 cpe:/o:oracle:linux:7.0
Novell Suse Linux Enterprise Desktop 12.0 cpe:/o:novell:suse_linux_enterprise_desktop:12.0:sp1
Novell Suse Linux Enterprise Software Development Kit 12.0 cpe:/o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1
Novell Suse Linux Enterprise Desktop 12.0 cpe:/o:novell:suse_linux_enterprise_desktop:12.0
Novell Suse Linux Enterprise Software Development Kit 12.0 cpe:/o:novell:suse_linux_enterprise_software_development_kit:12.0
  1. Oracle (1) Search CVE
    1. Linux (1) Search CVE
      1. 7.0
  2. Canonical (1) Search CVE
    1. Ubuntu Linux (4) Search CVE
      1. 12.04
      2. 16.04
      3. 14.04
      4. 15.10
  3. Novell (7) Search CVE
    1. Suse Linux Enterprise Desktop (1) Search CVE
      1. 12.0
    2. Suse Linux Enterprise Live Patching (1) Search CVE
      1. 12.0
    3. Suse Linux Enterprise Real Time Extension (1) Search CVE
      1. 12.0
    4. Suse Linux Enterprise Software Development Kit (1) Search CVE
      1. 12.0
    5. Suse Linux Enterprise Server (1) Search CVE
      1. 12.0
    6. Suse Linux Enterprise Workstation Extension (1) Search CVE
      1. 12.0
    7. Suse Linux Enterprise Module For Public Cloud (1) Search CVE
      1. 12.0
  4. Linux (1) Search CVE
    1. Linux Kernel (1) Search CVE
      1. 4.6.2

CWE

ID Name Description Links
CWE-264 Permissions, Privileges, and Access Controls Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control. CVE

References

Source Link
UBUNTU http://www.ubuntu.com/usn/USN-3018-2
UBUNTU http://www.ubuntu.com/usn/USN-3019-1
UBUNTU http://www.ubuntu.com/usn/USN-3018-1
CONFIRM http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
DEBIAN http://www.debian.org/security/2016/dsa-3607
CONFIRM http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3
MLIST http://www.openwall.com/lists/oss-security/2016/06/24/5
MLIST http://www.openwall.com/lists/oss-security/2016/09/29/10
CONFIRM http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
CONFIRM http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
CONFIRM http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
BID http://www.securityfocus.com/bid/91451
SECTRACK http://www.securitytracker.com/id/1036171
UBUNTU http://www.ubuntu.com/usn/USN-3016-1
UBUNTU http://www.ubuntu.com/usn/USN-3016-2
UBUNTU http://www.ubuntu.com/usn/USN-3016-3
UBUNTU http://www.ubuntu.com/usn/USN-3016-4
UBUNTU http://www.ubuntu.com/usn/USN-3017-1
UBUNTU http://www.ubuntu.com/usn/USN-3017-2
UBUNTU http://www.ubuntu.com/usn/USN-3017-3
UBUNTU http://www.ubuntu.com/usn/USN-3020-1
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1349722
MISC https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt
CONFIRM https://github.com/torvalds/linux/commit/ce683e5f9d045e5d67d1312a42b359cb2ab2a13c
CONFIRM https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541
EXPLOIT-DB https://www.exploit-db.com/exploits/40489/
EXPLOIT-DB https://www.exploit-db.com/exploits/40435/
REDHAT http://rhn.redhat.com/errata/RHSA-2016-1847.html
REDHAT http://rhn.redhat.com/errata/RHSA-2016-1875.html
REDHAT http://rhn.redhat.com/errata/RHSA-2016-1883.html