First published: Mon Oct 03 2016(Updated: )
A use after free vulnerability was found in the kernels socket recvmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. To attack the kernel using this method the system must be running application using the UDP recvmmsg syscall(). Upstream patch: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b88a68f26a75e4fded796f1a49c40f82234b7d">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b88a68f26a75e4fded796f1a49c40f82234b7d</a> Upstream discussion: <a href="https://patchwork.kernel.org/patch/8093221/">https://patchwork.kernel.org/patch/8093221/</a> Additional Write up: <a href="https://blog.lizzie.io/notes-about-cve-2016-7117.html">https://blog.lizzie.io/notes-about-cve-2016-7117.html</a>
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =7.0 | |
Linux Linux kernel | >=2.6.33<3.2.80 | |
Linux Linux kernel | >=3.3<3.4.113 | |
Linux Linux kernel | >=3.5<3.10.102 | |
Linux Linux kernel | >=3.11<3.12.59 | |
Linux Linux kernel | >=3.13<3.14.67 | |
Linux Linux kernel | >=3.15<3.16.35 | |
Linux Linux kernel | >=3.17<3.18.37 | |
Linux Linux kernel | >=3.19<4.1.28 | |
Linux Linux kernel | >=4.2.0<4.4.8 | |
Linux Linux kernel | >=4.5.0<4.5.2 | |
Canonical Ubuntu Linux | =16.04 | |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7117 is a use-after-free vulnerability in the Linux kernel that allows remote attackers to execute arbitrary code.
The Linux kernel versions before 4.5.2 are affected by CVE-2016-7117.
CVE-2016-7117 is classified as a critical vulnerability with a severity score of 9.
To fix CVE-2016-7117, update your Linux kernel to version 4.5.2 or later.
You can find more information about CVE-2016-7117 in the references provided: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b88a68f26a75e4fded796f1a49c40f82234b7d, http://source.android.com/security/bulletin/2016-10-01.html, http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.2.