{"id":"CVE-2016-7117","details":"Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.","modified":"2026-03-15T22:10:43.262920Z","published":"2016-10-10T11:00:13.670Z","related":["SUSE-SU-2016:2976-1","SUSE-SU-2016:3093-1","SUSE-SU-2016:3094-1","SUSE-SU-2016:3098-1","SUSE-SU-2016:3100-1","SUSE-SU-2016:3104-1","SUSE-SU-2016:3109-1","SUSE-SU-2016:3111-1","SUSE-SU-2016:3112-1","SUSE-SU-2016:3119-1","SUSE-SU-2016:3249-1","SUSE-SU-2017:0333-1","SUSE-SU-2017:0494-1","SUSE-SU-2017:0575-1","SUSE-SU-2017:1102-1","SUSE-SU-2017:1247-1","SUSE-SU-2017:1360-1","SUSE-SU-2017:1990-1","SUSE-SU-2017:2342-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0065.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0091.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0196.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0217.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93304"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2962.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0216.html"},{"type":"ADVISORY","url":"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.2"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0036.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0113.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0215.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0270.html"},{"type":"ADVISORY","url":"http://source.android.com/security/bulletin/2016-10-01.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0031.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0086.html"},{"type":"REPORT","url":"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7117.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1382268"},{"type":"REPORT","url":"https://security-tracker.debian.org/tracker/CVE-2016-7117"},{"type":"REPORT","url":"https://bugzilla.novell.com/show_bug.cgi?id=1003077"},{"type":"FIX","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b88a68f26a75e4fded796f1a49c40f82234b7d"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/34b88a68f26a75e4fded796f1a49c40f82234b7d"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7117.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"2.6.33"},{"fixed":"3.2.80"}]},{"events":[{"introduced":"3.3"},{"fixed":"3.4.113"}]},{"events":[{"introduced":"3.5"},{"fixed":"3.10.102"}]},{"events":[{"introduced":"3.11"},{"fixed":"3.12.59"}]},{"events":[{"introduced":"3.13"},{"fixed":"3.14.67"}]},{"events":[{"introduced":"3.15"},{"fixed":"3.16.35"}]},{"events":[{"introduced":"3.17"},{"fixed":"3.18.37"}]},{"events":[{"introduced":"3.19"},{"fixed":"4.1.28"}]},{"events":[{"introduced":"4.2.0"},{"fixed":"4.4.8"}]},{"events":[{"introduced":"4.5.0"},{"fixed":"4.5.2"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}