The scm_set_cred function in include/net/scm.h in the Linux kernel prior to 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel 3.8.2 |
||
linux linux kernel 3.8.7 |
||
linux linux kernel 3.8.0 |
||
linux linux kernel 3.8.6 |
||
linux linux kernel |
||
linux linux kernel 3.8.5 |
||
linux linux kernel 3.8.8 |
||
linux linux kernel 3.8.9 |
||
linux linux kernel 3.8.1 |
||
linux linux kernel 3.8.3 |
||
linux linux kernel 3.8.4 |