The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.
2013-05-03T11:57:45.707
2025-04-11T00:51:21.963
Deferred
CVSSv2: 6.9 (MEDIUM)
AV:L/AC:M/Au:N/C:C/I:C/A:C
3.4
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | ≤ 3.8.10 | Yes |
Operating System | linux | linux_kernel | 3.8.0 | Yes |
Operating System | linux | linux_kernel | 3.8.1 | Yes |
Operating System | linux | linux_kernel | 3.8.2 | Yes |
Operating System | linux | linux_kernel | 3.8.3 | Yes |
Operating System | linux | linux_kernel | 3.8.4 | Yes |
Operating System | linux | linux_kernel | 3.8.5 | Yes |
Operating System | linux | linux_kernel | 3.8.6 | Yes |
Operating System | linux | linux_kernel | 3.8.7 | Yes |
Operating System | linux | linux_kernel | 3.8.8 | Yes |
Operating System | linux | linux_kernel | 3.8.9 | Yes |