Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2016-4998
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-03 Jul, 2016 | 21:59
Updated At-12 Apr, 2025 | 10:46

The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.1HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Primary2.05.6MEDIUM
AV:L/AC:L/Au:N/C:P/I:N/A:C
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions up to 4.5.5(inclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>linux>>7
cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>12.04
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>14.04
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>15.10
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>16.04
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6e94e0cfb0887e4013b3b930fa6ab1fe6bb6ba91secalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.htmlsecalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2016-1847.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2016-1875.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2016-1883.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2017-0036.htmlsecalert@redhat.com
N/A
http://www.debian.org/security/2016/dsa-3607secalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2016/06/24/5secalert@redhat.com
N/A
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.htmlsecalert@redhat.com
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlsecalert@redhat.com
N/A
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/91451secalert@redhat.com
N/A
http://www.securitytracker.com/id/1036171secalert@redhat.com
N/A
http://www.ubuntu.com/usn/USN-3016-1secalert@redhat.com
Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-2secalert@redhat.com
Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-3secalert@redhat.com
Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-4secalert@redhat.com
Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-1secalert@redhat.com
Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-2secalert@redhat.com
Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-3secalert@redhat.com
Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-1secalert@redhat.com
Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-2secalert@redhat.com
Third Party Advisory
http://www.ubuntu.com/usn/USN-3019-1secalert@redhat.com
Third Party Advisory
http://www.ubuntu.com/usn/USN-3020-1secalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1349886secalert@redhat.com
Issue Tracking
Third Party Advisory
VDB Entry
https://github.com/torvalds/linux/commit/6e94e0cfb0887e4013b3b930fa6ab1fe6bb6ba91secalert@redhat.com
Patch
Vendor Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6e94e0cfb0887e4013b3b930fa6ab1fe6bb6ba91af854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2016-1847.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2016-1875.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2016-1883.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2017-0036.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2016/dsa-3607af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2016/06/24/5af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/91451af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securitytracker.com/id/1036171af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-3016-1af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-2af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-3af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-4af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-1af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-2af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-3af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-1af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-2af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3019-1af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3020-1af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1349886af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Third Party Advisory
VDB Entry
https://github.com/torvalds/linux/commit/6e94e0cfb0887e4013b3b930fa6ab1fe6bb6ba91af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
Change History
0Changes found

Details not found