First published: Mon Mar 06 2017(Updated: )
A flaw was found on the linux kernel which enables a race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c. Upstream patch: <a href="https://github.com/torvalds/linux/commit/32c231164b76">https://github.com/torvalds/linux/commit/32c231164b76</a> Follow-up upstream patches: <a href="https://github.com/torvalds/linux/commit/0382a25af3c7">https://github.com/torvalds/linux/commit/0382a25af3c7</a> <a href="https://github.com/torvalds/linux/commit/a3c18422a4b4">https://github.com/torvalds/linux/commit/a3c18422a4b4</a> <a href="https://github.com/torvalds/linux/commit/d5e3a190937a">https://github.com/torvalds/linux/commit/d5e3a190937a</a> <a href="https://github.com/torvalds/linux/commit/df90e6886146">https://github.com/torvalds/linux/commit/df90e6886146</a> <a href="https://github.com/torvalds/linux/commit/31e2f21fb35b">https://github.com/torvalds/linux/commit/31e2f21fb35b</a> Merge commit of the above series: <a href="https://github.com/torvalds/linux/commit/7752f72748db">https://github.com/torvalds/linux/commit/7752f72748db</a> Another follow-up upstream patch: <a href="https://github.com/torvalds/linux/commit/94d7ee0baa8b">https://github.com/torvalds/linux/commit/94d7ee0baa8b</a> References: <a href="https://source.android.com/security/bulletin/2017-03-01.html">https://source.android.com/security/bulletin/2017-03-01.html</a>
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.0.34<3.2 | |
Linux Linux kernel | >=3.2.20<3.2.88 | |
Linux Linux kernel | >=3.4.2<3.12.69 | |
Linux Linux kernel | >=3.13<3.16.40 | |
Linux Linux kernel | >=3.17<3.18.52 | |
Linux Linux kernel | >=3.19<4.4.38 | |
Linux Linux kernel | >=4.5<4.8.14 | |
Google Android | <=7.1.1 | |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2016-10200.
CVE-2016-10200 has a severity level of critical.
CVE-2016-10200 allows local users to gain privileges or cause a denial of service (use-after-free) through a race condition in the L2TPv3 IP Encapsulation feature.
The Linux kernel versions before 4.8.14 are affected by CVE-2016-10200.
To fix CVE-2016-10200, update your Linux kernel to version 4.8.14 or later.