avoid signed overflows for SO_{SND|RCV}BUFFORCE in kernel-net CVE-2016-9793

Tracked by Jolla (In release)

asked 2017-05-03 13:01:57 +0300

this post is marked as community wiki

This post is a wiki. Anyone with karma >75 is welcome to improve it.

updated 2017-05-03 13:01:57 +0300

lpr gravatar image

Description

The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option. CVSSv3 7.8 high

Patch is available but I would suggest taking the debian-wheezy backport of this.

Files affected: kernel-adaptation-sbj-3.4.108.20161101.1/net/core/sock.c lines 586-598 and 629-638

edit retag flag offensive close delete