vulnerability
Red Hat: CVE-2016-3134: Important: kernel-rt security and bug fix update ((Multiple Advisories))
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Apr 27, 2016 | Oct 21, 2016 | Jul 9, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Apr 27, 2016
Added
Oct 21, 2016
Modified
Jul 9, 2025
Description
The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-kernelredhat-upgrade-kernel-abi-whitelistsredhat-upgrade-kernel-bootwrapperredhat-upgrade-kernel-debugredhat-upgrade-kernel-debug-debuginforedhat-upgrade-kernel-debug-develredhat-upgrade-kernel-debuginforedhat-upgrade-kernel-debuginfo-common-ppc64redhat-upgrade-kernel-debuginfo-common-s390xredhat-upgrade-kernel-debuginfo-common-x86_64redhat-upgrade-kernel-develredhat-upgrade-kernel-docredhat-upgrade-kernel-headersredhat-upgrade-kernel-kdumpredhat-upgrade-kernel-kdump-debuginforedhat-upgrade-kernel-kdump-develredhat-upgrade-kernel-rtredhat-upgrade-kernel-rt-debugredhat-upgrade-kernel-rt-debug-debuginforedhat-upgrade-kernel-rt-debug-develredhat-upgrade-kernel-rt-debuginforedhat-upgrade-kernel-rt-debuginfo-common-x86_64redhat-upgrade-kernel-rt-develredhat-upgrade-kernel-rt-docredhat-upgrade-kernel-rt-traceredhat-upgrade-kernel-rt-trace-debuginforedhat-upgrade-kernel-rt-trace-develredhat-upgrade-kernel-toolsredhat-upgrade-kernel-tools-debuginforedhat-upgrade-kernel-tools-libsredhat-upgrade-kernel-tools-libs-develredhat-upgrade-perfredhat-upgrade-perf-debuginforedhat-upgrade-python-perfredhat-upgrade-python-perf-debuginfo
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.