CVE-2016-8655

CVSS v3.1 7.8 (High)
78% Progress
CVSS v2.0 7.2 (High)
72% Progress
EPSS 0.04 % (10th)
0.04% Progress
Affected Products 2
Advisories 47

Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.

Weaknesses
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-416
Use After Free
Related CVEs
CVE Status
PUBLISHED
CNA
Red Hat, Inc.
Published Date
2016-12-08 08:59:00
(7 years ago)
Updated Date
2023-02-12 23:26:42
(19 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel from 3.2 version and prior 3.2.85 version cpe:2.3:o:linux:linux_kernel >= 3.2 < 3.2.85
  Linux Kernel from 3.3 version and prior 3.10.106 version cpe:2.3:o:linux:linux_kernel >= 3.3 < 3.10.106
  Linux Kernel from 3.11 version and prior 3.12.69 version cpe:2.3:o:linux:linux_kernel >= 3.11 < 3.12.69
  Linux Kernel from 3.13 version and prior 3.16.40 version cpe:2.3:o:linux:linux_kernel >= 3.13 < 3.16.40
  Linux Kernel from 3.17 version and prior 3.18.46 version cpe:2.3:o:linux:linux_kernel >= 3.17 < 3.18.46
  Linux Kernel from 3.19 version and prior 4.1.37 version cpe:2.3:o:linux:linux_kernel >= 3.19 < 4.1.37
  Linux Kernel from 4.2 version and prior 4.4.38 version cpe:2.3:o:linux:linux_kernel >= 4.2 < 4.4.38
  Linux Kernel from 4.5 version and prior 4.8.14 version cpe:2.3:o:linux:linux_kernel >= 4.5 < 4.8.14

Configuration #2

    CPE23 From Up To
  Canonical Ubuntu Linux 12.04 cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-
  Canonical Ubuntu Linux 14.04 cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm
  Canonical Ubuntu Linux 16.04 cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm
  Canonical Ubuntu Linux 16.10 cpe:2.3:o:canonical:ubuntu_linux:16.10
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...