avoid signed overflows for SO_{SND|RCV}BUFFORCE in kernel-net CVE-2016-9793 [released]
asked 2017-05-03 13:01:57 +0200
This post is a wiki. Anyone with karma >75 is welcome to improve it.
The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option. CVSSv3 7.8 high
Patch is available but I would suggest taking the debian-wheezy backport of this.
Files affected: kernel-adaptation-sbj-3.4.108.20161101.1/net/core/sock.c lines 586-598 and 629-638
released in 2.1.1.12/Jämsänjoki
lpr ( 2017-06-14 18:09:39 +0200 )edit