[Forgot Password]
Login  Register Subscribe

23631

 
 

126941

 
 

98250

 
 

909

 
 

79281

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

Use-after-free vulnerability in Linux kernel due to a race condition in packet_set_ring leads

ID: oval:org.secpod.oval:def:38253Date: (C)2016-12-08   (M)2017-07-21
Class: VULNERABILITYFamily: unix




The host is installed with Linux kernel on RHEL 7 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a race condition in packet_set_ring leads. Successful exploitation could allow attackers to elevate their privileges on the system.

Platform:
Red Hat Enterprise Linux 7
Product:
kernel
Reference:
CVE-2016-8655
CVE    1
CVE-2016-8655
CPE    2
cpe:/o:linux:linux_kernel
cpe:/o:redhat:enterprise_linux:7

© 2013 SecPod Technologies