The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/95135 | vdb entry third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1402024 | issue tracking third party advisory |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=82981930125abfd39d7c8378a9cfdf5e1be2002b | patch vendor advisory |
http://www.openwall.com/lists/oss-security/2016/12/03/1 | mailing list vdb entry third party advisory |
https://github.com/torvalds/linux/commit/82981930125abfd39d7c8378a9cfdf5e1be2002b | third party advisory patch |