CVE-2016-4998Improper Restriction of Operations within the Bounds of a Memory Buffer in Kernel

Severity
7.1HIGHNVD
EPSS
1.5%
top 18.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 3
Latest updateMay 13

Description

The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages3 packages

Debianlinux/linux_kernel< 4.6.2-2+3

Also affects: Ubuntu Linux 12.04, 14.04, 15.10, 16.04

Patches

🔴Vulnerability Details

3
GHSA
GHSA-j87m-7c2j-m929: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 42022-05-13
OSV
CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 42016-07-03
CVEList
CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 42016-07-03

📋Vendor Advisories

12
Android
CVE-2016-4998: Android Security Bulletin 2016-09-01 CVE: CVE-2016-4998 Severity: MEDIUM References: A-29637687 Upstream kernel [2]2016-09-01
Ubuntu
Linux kernel (Wily HWE) vulnerabilities2016-06-27
Ubuntu
Linux kernel (Vivid HWE) vulnerabilities2016-06-27
Ubuntu
Linux kernel (Qualcomm Snapdragon) vulnerabilities2016-06-27
Ubuntu
Linux kernel vulnerabilities2016-06-27

💬Community

2
Bugzilla
CVE-2016-4998 kernel: kernel : out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt [fedora-all]2016-06-27
Bugzilla
CVE-2016-4998 kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt2016-06-24
CVE-2016-4998 — Linux Kernel vulnerability | cvebase