avoid signed overflows for SO_{SND|RCV}BUFFORCE in kernel-net CVE-2016-9793 [released]

Tracked by Jolla (In release)

asked 2017-05-03 13:01:57 +0200

this post is marked as community wiki

This post is a wiki. Anyone with karma >75 is welcome to improve it.

updated 2017-05-03 13:01:57 +0200

lpr gravatar image

Description

The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option. CVSSv3 7.8 high

Patch is available but I would suggest taking the debian-wheezy backport of this.

Files affected: kernel-adaptation-sbj-3.4.108.20161101.1/net/core/sock.c lines 586-598 and 629-638

edit retag flag offensive reopen delete

The question has been closed for the following reason "released in a software update" by lpr
close date 2017-06-14 18:09:47.866725

Comments

released in 2.1.1.12/Jämsänjoki

lpr ( 2017-06-14 18:09:39 +0200 )edit