### [CVE-2016-3135](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3135) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Integer overflow in the xt_alloc_table_info function in net/netfilter/x_tables.c in the Linux kernel through 4.5.2 on 32-bit platforms allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call. ### POC #### Reference - http://www.ubuntu.com/usn/USN-2930-2 - http://www.ubuntu.com/usn/USN-3056-1 - https://code.google.com/p/google-security-research/issues/detail?id=758 #### Github - https://github.com/Eyewearkyiv/bubble - https://github.com/FFhix10/bubble-wrap-tool - https://github.com/XirdigH/bubble-wrap-tool - https://github.com/balabit-deps/balabit-os-6-bubblewrap - https://github.com/balabit-deps/balabit-os-7-bubblewrap - https://github.com/balabit-deps/balabit-os-8-bubblewrap - https://github.com/balabit-deps/balabit-os-9-bubblewrap - https://github.com/containers/bubblewrap - https://github.com/darmon77/bwrap-ddsec - https://github.com/deepin-community/bubblewrap