Bug 1349886 (CVE-2016-4998)
Summary: | CVE-2016-4998 kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | agordeev, aquini, bhu, dhoward, esammons, fhrbata, iboverma, jkacur, joelsmith, jross, kernel-mgr, kstutsma, lgoncalv, lwang, matt, mcressma, mguzik, nmurray, plougher, pmatouse, ppandit, rvrbovsk, sardella, security-response-team, slawomir, vdronov, williams, wmealing, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2017-01-19 12:37:52 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1318693, 1318695, 1350316, 1351421, 1351422, 1351423, 1351424, 1351425, 1351426, 1351427, 1351428, 1364809, 1364810 | ||
Bug Blocks: | 1349725 |
Description
Adam Mariš
2016-06-24 12:51:05 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1350316] Public via: http://seclists.org/oss-sec/2016/q2/599 kernel-4.6.3-300.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report. kernel-4.5.7-202.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report. kernel-4.4.14-200.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in the following products: MRG for RHEL-6 v.2 Via RHSA-2016:1883 https://rhn.redhat.com/errata/RHSA-2016-1883.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:1847 https://rhn.redhat.com/errata/RHSA-2016-1847.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:1875 https://rhn.redhat.com/errata/RHSA-2016-1875.html This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:0036 https://rhn.redhat.com/errata/RHSA-2017-0036.html |