The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.
3.13.0-91.1383.16.0-76.98~14.04.13.19.0-64.72~14.04.14.2.0-41.48~14.04.14.4.0-28.47~14.04.14.4.0-28.474.4.0-1016.224.4.0-1019.224.15.0-1002.24.15.0-1003.34.15.0-1004.44.15.0-1008.84.15.0-1009.94.15.0-1012.124.15.0-1013.134.15.0-1014.144.15.0-1018.184.15.0-1019.19+34 more4.15.0-1001.14.15.0-1003.34.15.0-1005.54.15.0-1006.64.15.0-1008.84.15.0-1009.94.15.0-1010.104.15.0-1014.144.15.0-1015.154.15.0-1017.18+28 moreExploitability
AV:LAC:LPR:LUI:NScope
S:UImpact
C:HI:NA:HCVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H