Description
The nfnetlink_rcv_batch function in net/netfilter/nfnetlink.c in the Linux kernel before 4.5 does not check whether a batch message's length field is large enough, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (infinite loop or out-of-bounds read) by leveraging the CAP_NET_ADMIN capability.
References (4)
Core 4
Core References
Third Party Advisory x_refsource_confirm
http://source.android.com/security/bulletin/2016-11-01.html
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c58d6c93680f28ac58984af61d0a7ebf4319c241
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/94147
Issue Tracking, Patch x_refsource_confirm
https://github.com/torvalds/linux/commit/c58d6c93680f28ac58984af61d0a7ebf4319c241
Scores
CVSS v3
5.0
EPSS
0.0016
EPSS Percentile
36.5%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Details
CWE
CWE-125
CWE-200
Status
published
Products (1)
linux/linux_kernel
< 4.4.32
Published
Nov 16, 2016
Tracked Since
Feb 18, 2026