The socksetsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sksndbuf and skrcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAPNETADMIN capability for a crafted setsockopt system call with the (1) SOSNDBUFFORCE or (2) SO_RCVBUFFORCE option.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9793.json"
[
{
"events": [
{
"introduced": "3.5"
},
{
"fixed": "3.12.69"
}
]
},
{
"events": [
{
"introduced": "3.13"
},
{
"fixed": "3.16.40"
}
]
},
{
"events": [
{
"introduced": "3.17"
},
{
"fixed": "3.18.52"
}
]
},
{
"events": [
{
"introduced": "3.19"
},
{
"fixed": "4.1.50"
}
]
},
{
"events": [
{
"introduced": "4.2"
},
{
"fixed": "4.4.38"
}
]
},
{
"events": [
{
"introduced": "4.5"
},
{
"fixed": "4.8.14"
}
]
}
]