Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2016-8655


Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.


Published

2016-12-08T08:59:00.177

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-362
    CWE-416

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 3.2.85 Yes
Operating System linux linux_kernel < 3.10.106 Yes
Operating System linux linux_kernel < 3.12.69 Yes
Operating System linux linux_kernel < 3.16.40 Yes
Operating System linux linux_kernel < 3.18.46 Yes
Operating System linux linux_kernel < 4.1.37 Yes
Operating System linux linux_kernel < 4.4.38 Yes
Operating System linux linux_kernel < 4.8.14 Yes
Operating System canonical ubuntu_linux 12.04 Yes
Operating System canonical ubuntu_linux 14.04 Yes
Operating System canonical ubuntu_linux 16.04 Yes
Operating System canonical ubuntu_linux 16.10 Yes

References