<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: 5-Year-Old Linux Kernel Local Privilege Escalation Flaw Discovered</title>
	<atom:link href="http://www.epanorama.net/blog/2016/12/08/5-year-old-linux-kernel-local-privilege-escalation-flaw-discovered/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/12/08/5-year-old-linux-kernel-local-privilege-escalation-flaw-discovered/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 26 Apr 2026 11:16:35 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/12/08/5-year-old-linux-kernel-local-privilege-escalation-flaw-discovered/comment-page-1/#comment-1528013</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 09 Dec 2016 08:44:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=50197#comment-1528013</guid>
		<description><![CDATA[CVE-2016-8655 Linux af_packet.c race condition (local root)
http://www.openwall.com/lists/oss-security/2016/12/06/1 

This is an announcement about CVE-2016-8655 which is a race-condition
I found in Linux (net/packet/af_packet.c). It can be exploited to gain
kernel code execution from unprivileged processes.

The bug was introduced on Aug 19, 2011:
https://github.com/torvalds/linux/commit/f6fb8f100b807378fda19e83e5ac6828b638603a

Fixed on Nov 30, 2016:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c]]></description>
		<content:encoded><![CDATA[<p>CVE-2016-8655 Linux af_packet.c race condition (local root)<br />
<a href="http://www.openwall.com/lists/oss-security/2016/12/06/1" rel="nofollow">http://www.openwall.com/lists/oss-security/2016/12/06/1</a> </p>
<p>This is an announcement about CVE-2016-8655 which is a race-condition<br />
I found in Linux (net/packet/af_packet.c). It can be exploited to gain<br />
kernel code execution from unprivileged processes.</p>
<p>The bug was introduced on Aug 19, 2011:<br />
<a href="https://github.com/torvalds/linux/commit/f6fb8f100b807378fda19e83e5ac6828b638603a" rel="nofollow">https://github.com/torvalds/linux/commit/f6fb8f100b807378fda19e83e5ac6828b638603a</a></p>
<p>Fixed on Nov 30, 2016:<br />
<a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c" rel="nofollow">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/12/08/5-year-old-linux-kernel-local-privilege-escalation-flaw-discovered/comment-page-1/#comment-1528012</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 09 Dec 2016 08:43:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=50197#comment-1528012</guid>
		<description><![CDATA[packet: fix race condition in packet_set_ring 
https://github.com/torvalds/linux/commit/84ac7260236a49c79eede91617700174c2c19b0c]]></description>
		<content:encoded><![CDATA[<p>packet: fix race condition in packet_set_ring<br />
<a href="https://github.com/torvalds/linux/commit/84ac7260236a49c79eede91617700174c2c19b0c" rel="nofollow">https://github.com/torvalds/linux/commit/84ac7260236a49c79eede91617700174c2c19b0c</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/12/08/5-year-old-linux-kernel-local-privilege-escalation-flaw-discovered/comment-page-1/#comment-1528011</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 09 Dec 2016 08:42:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=50197#comment-1528011</guid>
		<description><![CDATA[CVE-2016-8655
https://access.redhat.com/security/cve/cve-2016-8655

A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system. 

This issue does not affect Red Hat Enterprise Linux 5 and 6.

CVE-2016-8655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655

Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.]]></description>
		<content:encoded><![CDATA[<p>CVE-2016-8655<br />
<a href="https://access.redhat.com/security/cve/cve-2016-8655" rel="nofollow">https://access.redhat.com/security/cve/cve-2016-8655</a></p>
<p>A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system. </p>
<p>This issue does not affect Red Hat Enterprise Linux 5 and 6.</p>
<p>CVE-2016-8655<br />
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655</a></p>
<p>Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
