We have moved to a new Sailfish OS Forum. Please start new discussions there.

Revision history [back]

click to hide/show revision 1
initial version

posted 2017-05-03 13:01:57 +0200

avoid signed overflows for SO_{SND|RCV}BUFFORCE in kernel-net CVE-2016-9793

Description

The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option. CVSSv3 7.8 high

Patch is available but I would suggest taking the debian-wheezy backport of this.

Files affected: kernel-adaptation-sbj-3.4.108.20161101.1/net/core/sock.c lines 586-598 and 629-638