Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-8655

Опубликовано: 06 дек. 2016
Источник: redhat
CVSS3: 7
CVSS2: 6.6
EPSS Средний

Описание

Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.

A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system.

Отчет

This issue does not affect Red Hat Enterprise Linux 5 and 6. This issue does affect Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future updates for the respective releases will address this issue. In a default or common use of Red Hat Enterprise Linux 7 this issue does not allow an unprivileged local user elevate their privileges on the system. In order to exploit this issue the attacker needs CAP_NET_RAW capability, which needs to be granted by the administrator to the attacker's account. Since Red Hat Enterprise Linux 7 does not have unprivileged user namespaces enabled by default, local unprivileged users also cannot abuse namespaces to grant this capability to themselves and elevate their privileges.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2017:038702.03.2017
Red Hat Enterprise Linux 7kernelFixedRHSA-2017:038602.03.2017
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2017:040202.03.2017

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-362->CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1400019kernel: Race condition in packet_set_ring leads to use after free

EPSS

Процентиль: 97%
0.34201
Средний

7 High

CVSS3

6.6 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.

CVSS3: 7.8
nvd
больше 8 лет назад

Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.

CVSS3: 7.8
debian
больше 8 лет назад

Race condition in net/packet/af_packet.c in the Linux kernel through 4 ...

CVSS3: 7.8
github
около 3 лет назад

Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.

CVSS3: 7.8
fstec
больше 8 лет назад

Уязвимость компонента net/packet/af_packet.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

EPSS

Процентиль: 97%
0.34201
Средний

7 High

CVSS3

6.6 Medium

CVSS2

Уязвимость CVE-2016-8655