First published: Fri Dec 02 2016(Updated: )
The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-514.16.1.rt56.437.el7 | 0:3.10.0-514.16.1.rt56.437.el7 |
redhat/kernel | <0:3.10.0-514.16.1.el7 | 0:3.10.0-514.16.1.el7 |
redhat/kernel-rt | <1:3.10.0-514.rt56.219.el6 | 1:3.10.0-514.rt56.219.el6 |
Linux Linux kernel | >=3.5<3.12.69 | |
Linux Linux kernel | >=3.13<3.16.40 | |
Linux Linux kernel | >=3.17<3.18.52 | |
Linux Linux kernel | >=3.19<4.1.50 | |
Linux Linux kernel | >=4.2<4.4.38 | |
Linux Linux kernel | >=4.5<4.8.14 | |
redhat/kernel | <4.9 | 4.9 |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)