Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-3134

Опубликовано: 10 мар. 2016
Источник: redhat
CVSS3: 6.4
CVSS2: 6.2

Описание

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

A security flaw was found in the Linux kernel in the mark_source_chains() function in "net/ipv4/netfilter/ip_tables.c". It is possible for a user-supplied "ipt_entry" structure to have a large "next_offset" field. This field is not bounds checked prior to writing to a counter value at the supplied offset.

Отчет

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6. This issue is not currently planned to be addressed in future updates, as user namespaces which the flaw affects are not supported in these products. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelWill not fix
Red Hat Enterprise Linux 6kernelWill not fix
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2016:187515.09.2016
Red Hat Enterprise Linux 7kernelFixedRHSA-2016:184715.09.2016
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2016:188314.09.2016

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1317383kernel: netfilter: missing bounds check in ipt_entry structure

6.4 Medium

CVSS3

6.2 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.4
ubuntu
около 9 лет назад

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

CVSS3: 8.4
nvd
около 9 лет назад

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

CVSS3: 8.4
debian
около 9 лет назад

The netfilter subsystem in the Linux kernel through 4.5.2 does not val ...

CVSS3: 8.4
github
около 3 лет назад

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

oracle-oval
больше 8 лет назад

ELSA-2016-3625: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

6.4 Medium

CVSS3

6.2 Medium

CVSS2