Bug 1406358 (CVE-2016-7917) - CVE-2016-7917 kernel: netfilter: nfnetlink: correctly validate length of batch messages
Summary: CVE-2016-7917 kernel: netfilter: nfnetlink: correctly validate length of batc...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2016-7917
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1395269
TreeView+ depends on / blocked
 
Reported: 2016-12-20 11:33 UTC by Vladis Dronov
Modified: 2021-02-17 02:51 UTC (History)
34 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
The nfnetlink_rcv_batch() function in 'net/netfilter/nfnetlink.c' in the Linux kernel before 4.5 does not check whether a batch message's length field is large enough, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (infinite loop or out-of-bounds read) by leveraging the CAP_NET_ADMIN capability.
Clone Of:
Environment:
Last Closed: 2016-12-20 11:36:44 UTC
Embargoed:


Attachments (Terms of Use)

Description Vladis Dronov 2016-12-20 11:33:42 UTC
The nfnetlink_rcv_batch() function in 'net/netfilter/nfnetlink.c' in the Linux kernel before 4.5 does not check whether a batch message's length field is large enough, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (infinite loop or out-of-bounds read) by leveraging the CAP_NET_ADMIN capability.

References:

https://source.android.com/security/bulletin/2016-11-01.html#id-in-kernel-components-1

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7917

Upstream patch:

https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c58d6c93680f28ac58984af61d0a7ebf4319c241

Comment 3 Vladis Dronov 2016-12-20 11:36:44 UTC
Statement:

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG-2 as code with the flaw is not present in the products listed.


Note You need to log in before you can comment on or make changes to this bug.