Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-772-1 | linux security update |
Ubuntu USN |
USN-3149-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-3149-2 | Linux kernel (Trusty HWE) vulnerability |
Ubuntu USN |
USN-3150-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-3150-2 | Linux kernel (OMAP4) vulnerability |
Ubuntu USN |
USN-3151-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-3151-2 | Linux kernel (Xenial HWE) vulnerability |
Ubuntu USN |
USN-3151-3 | Linux kernel (Qualcomm Snapdragon) vulnerability |
Ubuntu USN |
USN-3151-4 | Linux kernel (Raspberry Pi 2) vulnerability |
Ubuntu USN |
USN-3152-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-3152-2 | Linux kernel (Raspberry Pi 2) vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T02:27:41.252Z
Reserved: 2016-10-12T00:00:00
Link: CVE-2016-8655
No data.
Status : Deferred
Published: 2016-12-08T08:59:00.177
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-8655
OpenCVE Enrichment
No data.
Debian DLA
Ubuntu USN