The socksetsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sksndbuf and skrcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAPNETADMIN capability for a crafted setsockopt system call with the (1) SOSNDBUFFORCE or (2) SO_RCVBUFFORCE option.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9793.json"
[
{
"target": {
"file": "net/core/sock.c"
},
"digest": {
"line_hashes": [
"59561021734406449159275246250911179199",
"233139220197558674751643528715725359680",
"50213691123803499784345020633961907554",
"147639532172294374542028245549577798741",
"76724618273273348601743287519044132091",
"297585806338198617056154932500549917036",
"201388670935671336058281005754698583998",
"331332794085064267704249398648146782599"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2016-9793-46037452",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@b98b0bc8c431e3ceb4b26b0dfc8db509518fb290",
"deprecated": false,
"signature_version": "v1"
}
]