The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.11 performs a capability check in an incorrect namespace, which allows local users to gain privileges via PID spoofing.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d661684cf6820331feae71146c35da83d794467e | broken link |
http://www.ubuntu.com/usn/USN-1995-1 | vdb entry third party advisory vendor advisory |
https://github.com/torvalds/linux/commit/d661684cf6820331feae71146c35da83d794467e | patch exploit |
https://bugzilla.redhat.com/show_bug.cgi?id=1004736 | issue tracking exploit patch |
http://www.openwall.com/lists/oss-security/2013/09/05/3 | mailing list exploit patch |
https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.11.bz2 | patch |
http://www.ubuntu.com/usn/USN-1998-1 | vdb entry third party advisory vendor advisory |