Vulnerability Description
Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.0.34, < 3.2 |
| Android | <= 7.1.1 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=32c231Issue TrackingPatchThird Party Advisory
- http://source.android.com/security/bulletin/2017-03-01.htmlThird Party Advisory
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14Release NotesVendor Advisory
- http://www.securityfocus.com/bid/101783Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037965Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037968Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:1842Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2077Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2437Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2444Third Party Advisory
- https://github.com/torvalds/linux/commit/32c231164b762dddefa13af5a0101032c70b50eIssue TrackingPatchThird Party Advisory
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=32c231Issue TrackingPatchThird Party Advisory
- http://source.android.com/security/bulletin/2017-03-01.htmlThird Party Advisory
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14Release NotesVendor Advisory
- http://www.securityfocus.com/bid/101783Third Party AdvisoryVDB Entry
FAQ
What is CVE-2016-10200?
CVE-2016-10200 is a vulnerability with a CVSS score of 7.0 (HIGH). Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind syst...
How severe is CVE-2016-10200?
CVE-2016-10200 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10200?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Google Android.