Your submission was sent successfully! Close

CVE-2016-10200

Published: 07 March 2017

Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.

From the Ubuntu security team

Baozeng Ding and Andrey Konovalov discovered a race condition in the L2TPv3 IP Encapsulation implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.

Priority

Medium

CVSS 3 base score: 7.0

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
Patches:
Introduced by c51ce49735c183ef2592db70f918ee698716276b
Fixed by 32c231164b762dddefa13af5a0101032c70b50ef
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-azure
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-euclid
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-gcp
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-kvm
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-oem
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (4.9~rc7)

Notes

AuthorNote
jdstrand
android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.10 and earlier preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support
seth-arnold
The commit message includes "The same issue exists with
l2tp_ip_bind() and l2tp_ip_bind_table" but the patch appears to fix
only l2tp_ip_bind() and l2tp_ip6_bind.

References