First published: Fri Dec 02 2016(Updated: )
The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-514.16.1.rt56.437.el7 | 0:3.10.0-514.16.1.rt56.437.el7 |
redhat/kernel | <0:3.10.0-514.16.1.el7 | 0:3.10.0-514.16.1.el7 |
redhat/kernel-rt | <1:3.10.0-514.rt56.219.el6 | 1:3.10.0-514.rt56.219.el6 |
redhat/kernel | <4.9 | 4.9 |
Linux Kernel | >=3.5<3.12.69 | |
Linux Kernel | >=3.13<3.16.40 | |
Linux Kernel | >=3.17<3.18.52 | |
Linux Kernel | >=3.19<4.1.50 | |
Linux Kernel | >=4.2<4.4.38 | |
Linux Kernel | >=4.5<4.8.14 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2016-9793 has been rated as a high severity vulnerability due to its potential to cause denial of service and memory corruption.
To fix CVE-2016-9793, upgrade to a kernel version newer than 4.8.14 or apply the specific patches provided by your Linux distribution.
CVE-2016-9793 affects various versions of the Linux kernel prior to 4.8.14 as well as several specific distributions such as Red Hat and Debian.
CVE-2016-9793 is a local denial of service vulnerability that arises from improper handling of socket options in the Linux kernel.
No, CVE-2016-9793 requires local user access to be exploited, making it a local privilege escalation nor denial of service issue.