Use-after-free vulnerability in the _sysrecvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7117.json"
[
{
"id": "CVE-2016-7117-8b8cf578",
"signature_type": "Function",
"digest": {
"function_hash": "141578609920145532345628622194218243981",
"length": 1387.0
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@34b88a68f26a75e4fded796f1a49c40f82234b7d",
"target": {
"function": "__sys_recvmmsg",
"file": "net/socket.c"
},
"deprecated": false
},
{
"id": "CVE-2016-7117-d34bf04b",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"335464892895343169421740959857116553368",
"280225968631698328795869621466017720464",
"142032248156952415894495531772675801424",
"22931343954121193525326083088443748090",
"37551384407764444140275969701465165063",
"156252678774564277866794133091198875807",
"215745199172380073449671704985511711190",
"304119806476525977920162724503873939731",
"186397643404644706704077641499085842071",
"226002646782861705395481957356237767369",
"314637342065999704987368651801946101326",
"184700325228833679494487020699706889924",
"315745373721360404247933363751628051364",
"143568138331627825443832295122876582025"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@34b88a68f26a75e4fded796f1a49c40f82234b7d",
"target": {
"file": "net/socket.c"
},
"deprecated": false
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7117.json"
[
{
"id": "CVE-2016-7117-38a6d0e3",
"signature_type": "Function",
"digest": {
"function_hash": "141578609920145532345628622194218243981",
"length": 1387.0
},
"signature_version": "v1",
"source": "https://github.com/torvalds/linux/commit/34b88a68f26a75e4fded796f1a49c40f82234b7d",
"target": {
"function": "__sys_recvmmsg",
"file": "net/socket.c"
},
"deprecated": false
},
{
"id": "CVE-2016-7117-e16bf20e",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"335464892895343169421740959857116553368",
"280225968631698328795869621466017720464",
"142032248156952415894495531772675801424",
"22931343954121193525326083088443748090",
"37551384407764444140275969701465165063",
"156252678774564277866794133091198875807",
"215745199172380073449671704985511711190",
"304119806476525977920162724503873939731",
"186397643404644706704077641499085842071",
"226002646782861705395481957356237767369",
"314637342065999704987368651801946101326",
"184700325228833679494487020699706889924",
"315745373721360404247933363751628051364",
"143568138331627825443832295122876582025"
]
},
"signature_version": "v1",
"source": "https://github.com/torvalds/linux/commit/34b88a68f26a75e4fded796f1a49c40f82234b7d",
"target": {
"file": "net/socket.c"
},
"deprecated": false
}
]