CVE-2016-7917 PUBLISHED

The nfnetlink_rcv_batch function in net/netfilter/nfnetlink.c in the Linux kernel before 4.5 does not check whether a batch message's length field is large enough, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (infinite loop or out-of-bounds read) by leveraging the CAP_NET_ADMIN capability.

EPSS 0.16% · 36.9th percentile

Risk Scores

EPSS Score
0.16%
36.9th percentile

Affected Products

VendorProductVersions
Ubuntu:22.04:LTSlinux-riscv5.15.0-1011.12, 5.15.0-1008.8, 5.15.0-1007.7
Ubuntu:20.04:LTSlinux-raspi25.3.0-1017.19, 0, 5.3.0-1007.8
Ubuntu:16.04:LTSlinux-raspi24.4.0-1042.49, 4.4.0-1040.47, 4.4.0-1038.45
Ubuntu:18.04:LTSlinux-hwe-edge5.3.0-24.26~18.04.2, 5.3.0-23.25~18.04.2, 5.3.0-23.25~18.04.1
Ubuntu:14.04:LTSlinux-lts-xenial4.4.0-34.53~14.04.1, 4.4.0-13.29~14.04.1, 4.4.0-14.30~14.04.2
Ubuntu:18.04:LTSlinux-gcp5.0.0-1034.35, 5.0.0-1033.34, 5.0.0-1031.32
Ubuntu:16.04:LTSlinux4.4.0-47.68, 4.4.0-45.66, 4.4.0-43.63
Ubuntu:18.04:LTSlinux-azure4.15.0-1037.39, 0, 4.15.0-1002.2
Ubuntu:16.04:LTSlinux-aws4.4.0-1004.13, 4.4.0-1003.12, 4.4.0-1001.10
Ubuntu:18.04:LTSlinux-hwe4.18.0-25.26~18.04.1, 5.0.0-23.24~18.04.1, 5.0.0-25.26~18.04.1
Ubuntu:24.04:LTSlinux-raspi-realtime6.8.0-2019.20, 0
Ubuntu:20.04:LTSlinux-riscv5.4.0-26.30, 5.4.0-24.28, 5.4.0-33.37
Ubuntu:22.04:LTSlinux-realtime5.15.0-1032.35, 0
Ubuntu:16.04:LTSlinux-gke4.4.0-1008.8, 4.4.0-1009.9, 4.4.0-1010.10
Ubuntu:16.04:LTSlinux-snapdragon4.4.0-1013.14, 4.4.0-1057.61, 4.4.0-1055.59
Ubuntu:20.04:LTSlinux-azure-fde5.4.0-1095.101+cvm1.1, 5.4.0-1103.109+cvm1.1, 5.4.0-1100.106+cvm1.1
Ubuntu:22.04:LTSlinux-intel-iot-realtime0, 5.15.0-1073.75
Ubuntu:20.04:LTSlinux-gke5.4.0-1065.68, 0, 5.4.0-1033.35
Ubuntu:18.04:LTSlinux-oem4.15.0-1103.114, 4.15.0-1101.112, 4.15.0-1100.110

Timeline

References

Open in Interactive Console →