Vulnerability Description
The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 2.6.17, < 3.2.80 |
| Canonical | Ubuntu Linux | 12.04 |
| Novell | Suse Linux Enterprise Software Development Kit | 12.0 |
| Novell | Suse Linux Enterprise Desktop | 12.0 |
| Novell | Suse Linux Enterprise Live Patching | 12.0 |
| Novell | Suse Linux Enterprise Module For Public Cloud | 12.0 |
| Novell | Suse Linux Enterprise Real Time Extension | 12.0 |
| Novell | Suse Linux Enterprise Server | 12.0 |
| Novell | Suse Linux Enterprise Workstation Extension | 12.0 |
| Oracle | Linux | 7 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683eVendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-1847.htmlThird Party Advisory
FAQ
What is CVE-2016-4997?
CVE-2016-4997 is a vulnerability with a CVSS score of 7.8 (HIGH). The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of s...
How severe is CVE-2016-4997?
CVE-2016-4997 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-4997?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Canonical Ubuntu Linux, Novell Suse Linux Enterprise Software Development Kit, Novell Suse Linux Enterprise Desktop, Novell Suse Linux Enterprise Live Patching.