CVE-2016-8655

Source
Severity High
Remote No
Type Privilege escalation
Description
A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system.
Group Package Affected Fixed Severity Status Ticket
AVG-98 linux-zen 4.8.12-1 4.8.12-2 High Fixed
AVG-97 linux-grsec 1:4.8.12.r201612031658-1 1:4.8.12.r201612031658-2 High Fixed
AVG-96 linux-lts 4.4.35-1 4.4.36-1 High Fixed
AVG-95 linux 4.8.12-1 4.8.12-2 High Fixed
Date Advisory Group Package Severity Description
07 Dec 2016 ASA-201612-8 AVG-98 linux-zen High privilege escalation
06 Dec 2016 ASA-201612-7 AVG-96 linux-lts High privilege escalation
06 Dec 2016 ASA-201612-6 AVG-95 linux High privilege escalation
06 Dec 2016 ASA-201612-5 AVG-97 linux-grsec High privilege escalation
References
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c
http://seclists.org/oss-sec/2016/q4/607
Notes
In order to exploit this issue the attacker needs CAP_NET_RAW capability, which needs to be granted by the administrator to the attacker's account. Without unprivileged user namespaces enabled, local unprivileged users also cannot abuse namespaces to grant this capability to themselves and elevate their privileges.