Severity |
|
Remote |
|
Type |
|
Description |
+ |
A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system. |
|
References |
+ |
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c |
+ |
http://seclists.org/oss-sec/2016/q4/607 |
|
Notes |
+ |
In order to exploit this issue the attacker needs CAP_NET_RAW capability, which needs to be granted by the administrator to the attacker's account. Without unprivileged user namespaces enabled, local unprivileged users also cannot abuse namespaces to grant this capability to themselves and elevate their privileges. |
|