It was found that the Linux kernel's IPv6 implementation mishandled socket options. A local attacker could abuse concurrent access to the socket options to escalate their privileges, or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.
Find out more about CVE-2016-3841 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects Red Hat Enterprise Linux 6 and 7 kernels. This issue was fixed in a version 6 prior to this issue being raised.
As this issue is rated as important, it has been scheduled to be fixed in a future version of Red Hat Enterprise Linux 7.
Base Score | 6.9 |
---|---|
Base Metrics | AV:L/AC:M/Au:N/C:C/I:C/A:C |
Access Vector | Local |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Complete |
Integrity Impact | Complete |
Availability Impact | Complete |
CVSS3 Base Score | 8.4 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Attack Vector | Local |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity Impact | High |
Availability Impact | High |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux Extended Update Support 7.2 (kernel) | RHSA-2016:2695 | 2016-11-09 |
Red Hat Enterprise Linux for Real Time for NFV (v. 7) (kernel-rt) | RHSA-2016:2584 | 2016-11-03 |
Red Hat Enterprise Linux 6 (kernel) | RHSA-2016:0855 | 2016-05-10 |
Red Hat Enterprise Linux 7 (kernel) | RHSA-2016:2574 | 2016-11-03 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise MRG 2 | realtime-kernel | Affected |
Red Hat Enterprise Linux 5 | kernel | Not affected |