Описание
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.
An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kernel | Not affected | ||
Red Hat Enterprise Linux 6 | kernel | Fixed | RHSA-2017:0036 | 10.01.2017 |
Red Hat Enterprise Linux 7 | kernel-rt | Fixed | RHSA-2016:1875 | 15.09.2016 |
Red Hat Enterprise Linux 7 | kernel | Fixed | RHSA-2016:1847 | 15.09.2016 |
Red Hat Enterprise MRG 2 | kernel-rt | Fixed | RHSA-2016:1883 | 14.09.2016 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.1 Medium
CVSS3
5.6 Medium
CVSS2
Связанные уязвимости
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subs ...
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.
ELSA-2016-3619: Unbreakable Enterprise kernel security update (IMPORTANT)
EPSS
6.1 Medium
CVSS3
5.6 Medium
CVSS2