Name | CVE-2016-3134 |
Description | The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more) |
References | DLA-516-1, DSA-3607-1 |
NVD severity | high |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
linux (PTS) | stretch | 4.9.228-1 | fixed |
stretch (security) | 4.9.246-2 | fixed | |
buster, buster (security) | 4.19.171-2 | fixed | |
bullseye, sid | 5.10.13-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
linux | source | wheezy | 3.2.81-1 | DLA-516-1 | ||
linux | source | jessie | 3.16.7-ckt25-2+deb8u2 | DSA-3607-1 | ||
linux | source | (unstable) | 4.5.1-1 |
[wheezy] - linux <no-dsa> (Minor issue)
https://code.google.com/p/google-security-research/issues/detail?id=758
https://patchwork.ozlabs.org/patch/595575/
http://marc.info/?l=netfilter-devel&m=145757134822741&w=2
https://www.openwall.com/lists/oss-security/2016/03/10/4
https://www.openwall.com/lists/oss-security/2016/03/10/7
Non-privileged user namespaces disabled by default, only vulnerable with sysctl kernel.unprivileged_userns_clone=1