The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcpipv4.c and net/ipv6/tcpipv6.c.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-8645.json"
[
{
"id": "CVE-2016-8645-0ab700ff",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@ac6e780070e30e4c35bd395acfe9191e6268bdd3",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"200227676392579707997585211659297891587",
"182371048008422980765720719246054957682",
"73222046477389791111721668230878326433",
"44151135108716203816902047925869393136"
]
},
"target": {
"file": "include/net/tcp.h"
}
},
{
"id": "CVE-2016-8645-12dcb6bb",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@ac6e780070e30e4c35bd395acfe9191e6268bdd3",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"digest": {
"function_hash": "25558693982376095155276948303259514976",
"length": 3698.0
},
"target": {
"function": "tcp_v6_rcv",
"file": "net/ipv6/tcp_ipv6.c"
}
},
{
"id": "CVE-2016-8645-1b882454",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@ac6e780070e30e4c35bd395acfe9191e6268bdd3",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"257224766305609596748292214835599288615",
"276066395305652602157334515637298315988",
"113185338238657499385090939003435394815",
"182415519264370826236268582263961513326",
"140460932526046672427268472098514080226",
"149550015345036676172206002993059890327",
"183404524733646414121358142036649190200",
"193279733419014963652161552656743978087"
]
},
"target": {
"file": "net/ipv4/tcp_ipv4.c"
}
},
{
"id": "CVE-2016-8645-69f7ebf8",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@ac6e780070e30e4c35bd395acfe9191e6268bdd3",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"digest": {
"function_hash": "116023777498327973026282908281113058066",
"length": 3955.0
},
"target": {
"function": "tcp_v4_rcv",
"file": "net/ipv4/tcp_ipv4.c"
}
},
{
"id": "CVE-2016-8645-f5d0b1d0",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@ac6e780070e30e4c35bd395acfe9191e6268bdd3",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"111236706654248514903274008277565987857",
"2852738047342261253457326877046072575",
"115194689862248250988488856947785268945",
"295457865789135747448260749817248686394",
"183995275622245374633624865284220628489",
"165373710237856431712823434073769485592",
"15131892909048651398080707650460258134",
"183404524733646414121358142036649190200",
"190668676464010022859966395333720515435"
]
},
"target": {
"file": "net/ipv6/tcp_ipv6.c"
}
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-8645.json"
[
{
"id": "CVE-2016-8645-19c578cd",
"source": "https://github.com/torvalds/linux/commit/ac6e780070e30e4c35bd395acfe9191e6268bdd3",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"200227676392579707997585211659297891587",
"182371048008422980765720719246054957682",
"73222046477389791111721668230878326433",
"44151135108716203816902047925869393136"
]
},
"target": {
"file": "include/net/tcp.h"
}
},
{
"id": "CVE-2016-8645-5272c283",
"source": "https://github.com/torvalds/linux/commit/ac6e780070e30e4c35bd395acfe9191e6268bdd3",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"digest": {
"function_hash": "116023777498327973026282908281113058066",
"length": 3955.0
},
"target": {
"function": "tcp_v4_rcv",
"file": "net/ipv4/tcp_ipv4.c"
}
},
{
"id": "CVE-2016-8645-a876d7e1",
"source": "https://github.com/torvalds/linux/commit/ac6e780070e30e4c35bd395acfe9191e6268bdd3",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"257224766305609596748292214835599288615",
"276066395305652602157334515637298315988",
"113185338238657499385090939003435394815",
"182415519264370826236268582263961513326",
"140460932526046672427268472098514080226",
"149550015345036676172206002993059890327",
"183404524733646414121358142036649190200",
"193279733419014963652161552656743978087"
]
},
"target": {
"file": "net/ipv4/tcp_ipv4.c"
}
},
{
"id": "CVE-2016-8645-a9f1e236",
"source": "https://github.com/torvalds/linux/commit/ac6e780070e30e4c35bd395acfe9191e6268bdd3",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"digest": {
"function_hash": "25558693982376095155276948303259514976",
"length": 3698.0
},
"target": {
"function": "tcp_v6_rcv",
"file": "net/ipv6/tcp_ipv6.c"
}
},
{
"id": "CVE-2016-8645-f500ea75",
"source": "https://github.com/torvalds/linux/commit/ac6e780070e30e4c35bd395acfe9191e6268bdd3",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"111236706654248514903274008277565987857",
"2852738047342261253457326877046072575",
"115194689862248250988488856947785268945",
"295457865789135747448260749817248686394",
"183995275622245374633624865284220628489",
"165373710237856431712823434073769485592",
"15131892909048651398080707650460258134",
"183404524733646414121358142036649190200",
"190668676464010022859966395333720515435"
]
},
"target": {
"file": "net/ipv6/tcp_ipv6.c"
}
}
]