7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
9.6%
The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt
implementations in the netfilter subsystem in the Linux kernel before 4.6.3
allow local users to gain privileges or cause a denial of service (memory
corruption) by leveraging in-container root access to provide a crafted
offset value that triggers an unintended decrement.
Author | Note |
---|---|
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support |
sbeattie | priority is negligible on precise’s 3.2 kernels, as user namespaces are a privileged operation there. For xenial and linux-lts-xenial on trusty, this can be mitigated against by setting the kernel.unprivileged_userns_clone sysctl to 0 to disable userns support. When we fix the netfilter issue we will also add this sysctl to all other supported kernels to allow disabling unprivileged user namespaces. Disabling user namespace may impact chromium-browser, lxc, lxd, docker, and other tools. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 14.04 | noarch | linux | < 3.13.0-91.138 | UNKNOWN |
ubuntu | 15.10 | noarch | linux | < 4.2.0-41.48 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-28.47 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-lts-trusty | < 3.13.0-91.138~precise1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-utopic | < 3.16.0-76.98~14.04.1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-vivid | < 3.19.0-64.72~14.04.1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-wily | < 4.2.0-41.48~14.04.1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-xenial | < 4.4.0-28.47~14.04.1 | UNKNOWN |
ubuntu | 15.10 | noarch | linux-raspi2 | < 4.2.0-1033.43 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-raspi2 | < 4.4.0-1016.22 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2016-4997
marc.info/?l=oss-security&m=146679591706851&w=2
nvd.nist.gov/vuln/detail/CVE-2016-4997
security-tracker.debian.org/tracker/CVE-2016-4997
ubuntu.com/security/notices/USN-3016-1
ubuntu.com/security/notices/USN-3016-2
ubuntu.com/security/notices/USN-3016-3
ubuntu.com/security/notices/USN-3016-4
ubuntu.com/security/notices/USN-3017-1
ubuntu.com/security/notices/USN-3017-2
ubuntu.com/security/notices/USN-3017-3
ubuntu.com/security/notices/USN-3018-1
ubuntu.com/security/notices/USN-3018-2
ubuntu.com/security/notices/USN-3019-1
ubuntu.com/security/notices/USN-3020-1
ubuntu.com/security/notices/USN-3338-1
www.cve.org/CVERecord?id=CVE-2016-4997
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
9.6%