Back to bug 1400019

Who When What Removed Added
Adam Mariš 2016-11-30 10:02:22 UTC CC security-response-team
Adam Mariš 2016-11-30 10:06:52 UTC Blocks 1400022
Adam Mariš 2016-11-30 15:58:23 UTC Summary EMBARGOED kernel: Race condition in packet_set_ring leads to use after free EMBARGOED CVE-2016-8655 kernel: Race condition in packet_set_ring leads to use after free
Alias CVE-2016-8655
Andrej Nemec 2016-12-06 08:09:39 UTC Whiteboard impact=important,public=no,reported=20161130,source=distros,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-362->CWE-416,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=affected impact=important,public=20161206,reported=20161130,source=distros,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-362->CWE-416,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=affected
Andrej Nemec 2016-12-06 08:10:10 UTC Summary EMBARGOED CVE-2016-8655 kernel: Race condition in packet_set_ring leads to use after free CVE-2016-8655 kernel: Race condition in packet_set_ring leads to use after free
Andrej Nemec 2016-12-06 08:10:20 UTC Group security, qe_staff
Andrej Nemec 2016-12-06 08:10:40 UTC Depends On 1401820
Mark J. Cox 2016-12-06 08:25:14 UTC CC mjc
Huzaifa S. Sidhpurwala 2016-12-06 08:51:35 UTC Whiteboard impact=important,public=20161206,reported=20161130,source=distros,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-362->CWE-416,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=affected impact=important,public=20161206,reported=20161130,source=distros,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-362->CWE-416,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=affected,fedora-all/kernel=affected
Petr Matousek 2016-12-06 09:12:44 UTC CC pmatouse
Whiteboard impact=important,public=20161206,reported=20161130,source=distros,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-362->CWE-416,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=affected,fedora-all/kernel=affected impact=important,public=20161206,reported=20161130,source=distros,cvss2=6.6/AV:L/AC:M/Au:S/C:C/I:C/A:C,cvss3=7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-362->CWE-416,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=affected,fedora-all/kernel=affected
Petr Matousek 2016-12-06 09:19:20 UTC Depends On 1401852
Petr Matousek 2016-12-06 09:19:23 UTC Depends On 1401853
Petr Matousek 2016-12-06 09:19:35 UTC Depends On 1401854
Petr Matousek 2016-12-06 09:19:41 UTC Depends On 1401855
Petr Matousek 2016-12-06 09:19:50 UTC Depends On 1401856
Petr Matousek 2016-12-06 09:19:59 UTC Depends On 1401857
Tru Huynh 2016-12-06 09:45:03 UTC CC tru
Petr Matousek 2016-12-06 09:57:31 UTC Doc Text A race condition issue leading to user-after-free flaw was found in the way the raw packet sockets implementation in the Linux Kernel Networking Subsystem handled synchronization while creating TPACKET_V3 ring buffer. A local user able to open a raw packet socket (needs CAP_NET_RAW capability) could use this flaw to increase their privileges on the system.
Martin Prpič 2016-12-06 10:12:49 UTC Doc Text A race condition issue leading to user-after-free flaw was found in the way the raw packet sockets implementation in the Linux Kernel Networking Subsystem handled synchronization while creating TPACKET_V3 ring buffer. A local user able to open a raw packet socket (needs CAP_NET_RAW capability) could use this flaw to increase their privileges on the system. A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system.
Slawomir Czarko 2016-12-07 07:51:53 UTC CC slawomir
Martin Stefany 2016-12-07 07:56:50 UTC CC martin
Edu Alcaniz 2016-12-07 11:41:32 UTC CC ealcaniz
Flags needinfo?(security-response-team)
Petr Matousek 2016-12-07 11:53:56 UTC Flags needinfo?(security-response-team)
Edu Alcaniz 2016-12-07 12:41:03 UTC Flags needinfo?(security-response-team)
Petr Matousek 2016-12-07 14:16:18 UTC Flags needinfo?(security-response-team)
Norman Sardella 2016-12-07 16:35:36 UTC CC sardella
Christof Efkemann 2016-12-07 20:06:54 UTC CC chref
Hanns-Joachim Uhl 2016-12-09 10:24:24 UTC CC hannsj_uhl
Yasuhiro Ozone 2016-12-12 06:48:17 UTC CC yozone
Sander van dinten 2016-12-19 11:52:55 UTC CC sander.van.dinten
JINKOO HAN 2016-12-23 06:10:13 UTC CC jhan
Christian Rose 2016-12-27 09:28:25 UTC CC menthos
James Hartsock 2017-01-10 21:15:33 UTC CC hartsjc
Karl Abbott 2017-01-20 20:35:37 UTC CC kabbott
Petr Matousek 2017-09-05 05:04:33 UTC CC dafox7777777
Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2017-09-05 01:04:33 UTC
Product Security DevOps Team 2019-09-29 14:01:53 UTC Whiteboard impact=important,public=20161206,reported=20161130,source=distros,cvss2=6.6/AV:L/AC:M/Au:S/C:C/I:C/A:C,cvss3=7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-362->CWE-416,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=affected,fedora-all/kernel=affected
James Hartsock 2020-09-18 14:51:38 UTC CC hartsjc

Back to bug 1400019