Race-condition vulnerability in net/packet/af_packet.c in Linux Kernel (Debian)ID: oval:org.secpod.oval:def:38255 | Date: (C)2016-12-08 (M)2023-02-20 |
Class: VULNERABILITY | Family: unix |
A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system.
Platform: |
Debian 8.x |
Debian 7.x |
Product: |
linux-image-3.2 |
linux-image-3.16 |