Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7117

Опубликовано: 10 окт. 2016
Источник: debian
EPSS Средний

Описание

Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.5.2-1package
linuxfixed3.16.36-1jessiepackage
linuxfixed3.2.81-1wheezypackage

Примечания

  • Fixed by: https://git.kernel.org/linus/34b88a68f26a75e4fded796f1a49c40f82234b7d (4.6-rc1)

EPSS

Процентиль: 94%
0.12777
Средний

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.

CVSS3: 8.1
redhat
больше 9 лет назад

Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.

CVSS3: 9.8
nvd
больше 8 лет назад

Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.

CVSS3: 9.8
github
около 3 лет назад

Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.

oracle-oval
больше 8 лет назад

ELSA-2016-3655: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 94%
0.12777
Средний