First published: Thu Apr 26 2012(Updated: )
A flaw was found in the Linux kernel's implementation of setsockopt for the SO_{SND|RCV}BUF setsockopt() system call. Users with non-namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <3.5 | 3.5 |
Linux kernel | <3.2.85 | |
Linux kernel | >=3.3<3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6704 has been classified as a high severity vulnerability due to its potential impact on networking functions.
To fix CVE-2012-6704, upgrade the Linux kernel to version 3.5 or later.
CVE-2012-6704 affects Linux kernel versions prior to 3.5 and between versions 3.3 and 3.5.
CVE-2012-6704 can potentially be exploited by users with non-namespace CAP_NET_ADMIN permissions, impacting socket buffer sizes.
CVE-2012-6704 affects the setsockopt system call, specifically the SO_SND_BUF and SO_RCV_BUF options in the Linux kernel.