Race-condition vulnerability in net/packet/af_packet.c in Linux Kernel (Oracle Linux)ID: oval:org.secpod.oval:def:38256 | Date: (C)2016-12-08 (M)2023-02-20 |
Class: VULNERABILITY | Family: unix |
A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system.