Linux Linux Kernel 4.6.2 Denial Of Service Gain Privileges Memory Corruption Vulnerability
2 Aug. 2016
Linux Linux Kernel is prone to a denial of service (DoS) vulnerability.This allow a remote attacker to cause a denial of service (DoS) condition due to high consumption of system resources via certain vulnerable vectors. Linux Linux Kernel is prone to a gain privilege vulnerability. This allow local or remote attackers to gain privileges via a crafted application. Linux Linux Kernel is prone to a memory corruption vulnerability.This allows a remote attacker to run a arbitrary code in context of a logged in user. It might cause a denial of service conditions if the attack fails.
The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.