The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
2014-04-27T00:55:05.750
2025-04-12T10:46:40.837
Deferred
CVSSv2: 2.1 (LOW)
AV:L/AC:L/Au:N/C:N/I:P/A:N
3.9
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | ≤ 3.14.1 | Yes |
Operating System | opensuse | evergreen | 11.4 | Yes |
Operating System | redhat | enterprise_linux_desktop | 5 | Yes |
Operating System | redhat | enterprise_linux_server | 5.0 | Yes |
Operating System | suse | linux_enterprise_real_time_extension | 11 | Yes |
Operating System | suse | linux_enterprise_server | 10 | Yes |
Operating System | suse | linux_enterprise_server | 11 | Yes |
Operating System | suse | suse_linux_enterprise_server | 11 | Yes |