CVE-2016-4997
Published at:
-
03-07-2016 11:59
Last modified:
-
17-01-2023 10:17
Total changes:
-
4
Description
Common Vulnerability Scoring System (CVSS)
Low
Attack complexity
Local
Attack vector
High
Availability
High
Confidentiality
High
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
7.8
Base score
1.8
5.9
Exploitability score
Impact score
Verification logic
Reference
- [oss-security] 20160624 Linux CVE-2016-4997 (local privilege escalation) and CVE-2016-4998 (out of bounds memory access)-Mailing List, Third Party Advisory
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3
- https://github.com/torvalds/linux/commit/ce683e5f9d045e5d67d1312a42b359cb2ab2a13c
- https://bugzilla.redhat.com/show_bug.cgi?id=1349722
- USN-3017-2-Third Party Advisory
- USN-3018-2-Third Party Advisory
- SUSE-SU-2016:1710-Third Party Advisory
- USN-3016-4-Third Party Advisory
- USN-3016-1-Third Party Advisory
- USN-3016-2-Third Party Advisory
- USN-3016-3-Third Party Advisory
- USN-3018-1-Third Party Advisory
- USN-3019-1-Third Party Advisory
- SUSE-SU-2016:1709-Third Party Advisory
- USN-3017-3-Third Party Advisory
- USN-3020-1-Third Party Advisory
- USN-3017-1-Third Party Advisory
- SUSE-SU-2016:1937-Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- [oss-security] 20160929 CVE request - Linux kernel through 4.6.2 allows escalade privileges via IP6T_SO_SET_REPLACE compat setsockopt call-Exploit, Mailing List, Third Party Advisory
- https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- SUSE-SU-2016:2181-Mailing List, Third Party Advisory
- SUSE-SU-2016:2179-Mailing List, Third Party Advisory
- DSA-3607-Third Party Advisory
- SUSE-SU-2016:2178-Mailing List, Third Party Advisory
- 1036171-Third Party Advisory, VDB Entry
- SUSE-SU-2016:1985-Mailing List, Third Party Advisory
- 91451-Third Party Advisory, VDB Entry
- openSUSE-SU-2016:2184-Mailing List, Third Party Advisory
- SUSE-SU-2016:2180-Mailing List, Third Party Advisory
- SUSE-SU-2016:2174-Mailing List, Third Party Advisory
- SUSE-SU-2016:2177-Mailing List, Third Party Advisory
- SUSE-SU-2016:2105-Mailing List, Third Party Advisory
- SUSE-SU-2016:2018-Mailing List, Third Party Advisory
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541
- 40489-Third Party Advisory, VDB Entry
- 40435-Third Party Advisory, VDB Entry
- RHSA-2016:1883-Third Party Advisory
- RHSA-2016:1875-Third Party Advisory
- RHSA-2016:1847-Third Party Advisory
Keywords