Описание
The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
A security flaw was found in the Linux kernel in the mark_source_chains() function in "net/ipv4/netfilter/ip_tables.c". It is possible for a user-supplied "ipt_entry" structure to have a large "next_offset" field. This field is not bounds checked prior to writing to a counter value at the supplied offset.
Отчет
This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6. This issue is not currently planned to be addressed in future updates, as user namespaces which the flaw affects are not supported in these products. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kernel | Will not fix | ||
Red Hat Enterprise Linux 6 | kernel | Will not fix | ||
Red Hat Enterprise Linux 7 | kernel-rt | Fixed | RHSA-2016:1875 | 15.09.2016 |
Red Hat Enterprise Linux 7 | kernel | Fixed | RHSA-2016:1847 | 15.09.2016 |
Red Hat Enterprise MRG 2 | kernel-rt | Fixed | RHSA-2016:1883 | 14.09.2016 |
Показывать по
Дополнительная информация
Статус:
6.4 Medium
CVSS3
6.2 Medium
CVSS2
Связанные уязвимости
The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
The netfilter subsystem in the Linux kernel through 4.5.2 does not val ...
The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
ELSA-2016-3625: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)
6.4 Medium
CVSS3
6.2 Medium
CVSS2