CVE-2016-8655

CVSS V2 High 7.2 CVSS V3 High 7.8
Description
Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
Overview
  • CVE ID
  • CVE-2016-8655
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2016-12-08T08:59:00
  • Last Modified Date
  • 2023-02-12T23:26:42
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 1 OR 4.8.12
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • LOCAL
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 7.2
  • Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 7.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 1.8
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/140063/Linux-Kernel-4.4.0-AF_PACKET-Race-Condition-Privilege-Escalation.html Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2017-0386.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0387.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0402.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/12/06/1 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/94692 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037403 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037968 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3149-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3149-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-3150-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3150-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-3151-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3151-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-3151-3 Third Party Advisory
http://www.ubuntu.com/usn/USN-3151-4 Third Party Advisory
http://www.ubuntu.com/usn/USN-3152-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3152-2 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:0386
https://access.redhat.com/errata/RHSA-2017:0387
https://access.redhat.com/errata/RHSA-2017:0402
https://access.redhat.com/security/cve/CVE-2016-8655
https://bugzilla.redhat.com/show_bug.cgi?id=1400019 Issue Tracking Third Party Advisory VDB Entry
https://github.com/torvalds/linux/commit/84ac7260236a49c79eede91617700174c2c19b0c Patch Third Party Advisory
https://source.android.com/security/bulletin/2017-03-01.html Third Party Advisory
https://www.exploit-db.com/exploits/40871/ Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/44696/ Third Party Advisory VDB Entry
History
Created Old Value New Value Data Type Notes
2022-05-10 18:43:07 Added to TrackCVE
2022-12-02 12:16:30 2016-12-08T08:59Z 2016-12-08T08:59:00 CVE Published Date updated
2022-12-02 12:16:30 2018-05-25T01:29:00 CVE Modified Date updated
2022-12-02 12:16:30 Modified Vulnerability Status updated
2023-01-12 05:06:09 Modified Undergoing Analysis Vulnerability Status updated
2023-01-17 22:07:31 2023-01-17T21:06:51 CVE Modified Date updated
2023-01-17 22:07:31 Undergoing Analysis Analyzed Vulnerability Status updated
2023-02-02 17:05:45 2023-02-02T16:17:50 CVE Modified Date updated
2023-02-02 17:05:45 Analyzed Modified Vulnerability Status updated
2023-02-02 17:05:46 Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions. A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system. Description updated
2023-02-02 17:05:51 References updated
2023-02-13 01:06:51 2023-02-12T23:26:42 CVE Modified Date updated
2023-02-13 01:06:51 A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system. Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions. Description updated