Race-condition vulnerability in net/packet/af_packet.c in Linux Kernel (Oracle Linux)
|ID: oval:org.secpod.oval:def:38256||Date: (C)2016-12-08 (M)2018-01-05|
|Class: VULNERABILITY||Family: unix|
A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system.