CVE
- Id
- 95475
- CVE No.
- CVE-2016-8655
- Status
- Candidate
- Description
- Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
- Phase
- Assigned (20161012)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
798522 | 95475 | CVE-2016-8655 | EXPLOIT-DB:40871 | View |
798523 | 95475 | CVE-2016-8655 | URL:https://www.exploit-db.com/exploits/40871/ | View |
798524 | 95475 | CVE-2016-8655 | MLIST:[oss-security] 20161206 CVE-2016-8655 Linux af_packet.c race condition (local root) | View |
798525 | 95475 | CVE-2016-8655 | URL:http://www.openwall.com/lists/oss-security/2016/12/06/1 | View |
798526 | 95475 | CVE-2016-8655 | MISC:http://packetstormsecurity.com/files/140063/Linux-Kernel-4.4.0-AF_PACKET-Race-Condition-Privilege-Escalation.html | View |
798527 | 95475 | CVE-2016-8655 | CONFIRM:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c | View |
798528 | 95475 | CVE-2016-8655 | CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=1400019 | View |
798529 | 95475 | CVE-2016-8655 | CONFIRM:https://github.com/torvalds/linux/commit/84ac7260236a49c79eede91617700174c2c19b0c | View |
798530 | 95475 | CVE-2016-8655 | CONFIRM:https://source.android.com/security/bulletin/2017-03-01.html | View |
798531 | 95475 | CVE-2016-8655 | SUSE:SUSE-SU-2016:3096 | View |
798532 | 95475 | CVE-2016-8655 | URL:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html | View |
798533 | 95475 | CVE-2016-8655 | SUSE:SUSE-SU-2016:3113 | View |
798534 | 95475 | CVE-2016-8655 | URL:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html | View |
798535 | 95475 | CVE-2016-8655 | SUSE:SUSE-SU-2016:3116 | View |
798536 | 95475 | CVE-2016-8655 | URL:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html | View |
798537 | 95475 | CVE-2016-8655 | SUSE:SUSE-SU-2016:3117 | View |
798538 | 95475 | CVE-2016-8655 | URL:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html | View |
798539 | 95475 | CVE-2016-8655 | SUSE:SUSE-SU-2016:3169 | View |
798540 | 95475 | CVE-2016-8655 | URL:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html | View |
798541 | 95475 | CVE-2016-8655 | SUSE:SUSE-SU-2016:3183 | View |
798542 | 95475 | CVE-2016-8655 | URL:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html | View |
798543 | 95475 | CVE-2016-8655 | SUSE:SUSE-SU-2016:3197 | View |
798544 | 95475 | CVE-2016-8655 | URL:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html | View |
798545 | 95475 | CVE-2016-8655 | SUSE:SUSE-SU-2016:3205 | View |
798546 | 95475 | CVE-2016-8655 | URL:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html | View |
798547 | 95475 | CVE-2016-8655 | SUSE:SUSE-SU-2016:3206 | View |
798548 | 95475 | CVE-2016-8655 | URL:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html | View |
798549 | 95475 | CVE-2016-8655 | SUSE:SUSE-SU-2016:3247 | View |
798550 | 95475 | CVE-2016-8655 | URL:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html | View |
798551 | 95475 | CVE-2016-8655 | UBUNTU:USN-3149-1 | View |
798552 | 95475 | CVE-2016-8655 | URL:http://www.ubuntu.com/usn/USN-3149-1 | View |
798553 | 95475 | CVE-2016-8655 | UBUNTU:USN-3149-2 | View |
798554 | 95475 | CVE-2016-8655 | URL:http://www.ubuntu.com/usn/USN-3149-2 | View |
798555 | 95475 | CVE-2016-8655 | UBUNTU:USN-3150-1 | View |
798556 | 95475 | CVE-2016-8655 | URL:http://www.ubuntu.com/usn/USN-3150-1 | View |
798557 | 95475 | CVE-2016-8655 | UBUNTU:USN-3150-2 | View |
798558 | 95475 | CVE-2016-8655 | URL:http://www.ubuntu.com/usn/USN-3150-2 | View |
798559 | 95475 | CVE-2016-8655 | UBUNTU:USN-3151-1 | View |
798560 | 95475 | CVE-2016-8655 | URL:http://www.ubuntu.com/usn/USN-3151-1 | View |
798561 | 95475 | CVE-2016-8655 | UBUNTU:USN-3151-2 | View |
798562 | 95475 | CVE-2016-8655 | URL:http://www.ubuntu.com/usn/USN-3151-2 | View |
798563 | 95475 | CVE-2016-8655 | UBUNTU:USN-3151-3 | View |
798564 | 95475 | CVE-2016-8655 | URL:http://www.ubuntu.com/usn/USN-3151-3 | View |
798565 | 95475 | CVE-2016-8655 | UBUNTU:USN-3151-4 | View |
798566 | 95475 | CVE-2016-8655 | URL:http://www.ubuntu.com/usn/USN-3151-4 | View |
798567 | 95475 | CVE-2016-8655 | UBUNTU:USN-3152-1 | View |
798568 | 95475 | CVE-2016-8655 | URL:http://www.ubuntu.com/usn/USN-3152-1 | View |
798569 | 95475 | CVE-2016-8655 | UBUNTU:USN-3152-2 | View |
798570 | 95475 | CVE-2016-8655 | URL:http://www.ubuntu.com/usn/USN-3152-2 | View |
798571 | 95475 | CVE-2016-8655 | BID:94692 | View |
798572 | 95475 | CVE-2016-8655 | URL:http://www.securityfocus.com/bid/94692 | View |
798573 | 95475 | CVE-2016-8655 | SECTRACK:1037403 | View |