CVE-2016-9793

CVE Details

Release Date:2016-12-02

Description


The sock_setsockopt function in net/core/sock.c in the Linux kernelbefore 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.

See more information about CVE-2016-9793 from MITRE CVE dictionary and NIST NVD


CVSS v2.0 metrics


NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.

Base Score: 6.9 Base Metrics: AV:L/AC:M/Au:N/C:C/I:C/A:C
Access Vector: Local network Attack Complexity: Medium
Authentication: None required Confidentiality Impact: Complete
Integrity Impact: Complete Availability Impact: Complete

Errata information


PlatformErrataRelease Date
Oracle Linux version 5 (kernel-uek)ELSA-2017-35102017-01-12
Oracle Linux version 6 (dtrace-modules-3.8.13-118.16.2.el6uek)ELSA-2017-35092017-01-12
Oracle Linux version 6 (dtrace-modules-4.1.12-61.1.25.el6uek)ELSA-2017-35082017-01-12
Oracle Linux version 6 (kernel-uek)ELSA-2017-35082017-01-12
Oracle Linux version 6 (kernel-uek)ELSA-2017-35092017-01-12
Oracle Linux version 6 (kernel-uek)ELSA-2017-35102017-01-12
Oracle Linux version 7 (dtrace-modules-3.8.13-118.16.2.el7uek)ELSA-2017-35092017-01-12
Oracle Linux version 7 (dtrace-modules-4.1.12-61.1.25.el7uek)ELSA-2017-35082017-01-12
Oracle Linux version 7 (kernel)ELSA-2017-09332017-04-12
Oracle Linux version 7 (kernel)ELSA-2017-0933-12017-04-13
Oracle Linux version 7 (kernel-uek)ELSA-2017-35082017-01-12
Oracle Linux version 7 (kernel-uek)ELSA-2017-35092017-01-12
Oracle VM version 3.2 (kernel-uek)OVMSA-2017-00062017-01-12
Oracle VM version 3.3 (kernel-uek)OVMSA-2017-00052017-01-12
Oracle VM version 3.4 (kernel-uek)OVMSA-2017-00042017-01-12



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete