The Netlink implementation in the Linux kernel up to and including 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel |
||
redhat enterprise linux server 5.0 |
||
suse linux enterprise server 11 |
||
opensuse evergreen 11.4 |
||
suse linux enterprise real time extension 11 |
||
redhat enterprise linux desktop 5 |
||
suse linux enterprise server 10 |
||
suse suse linux enterprise server 11 |