** Description changed:

- It is possible, by passing a netlink socket to a more privileged
- executable and then fooling that executable into writing to the socket
- data that happens to be valid netlink message, to do something that
- privileged executable did not intend to do.
+ The Netlink implementation in the Linux kernel through 3.14.1 does not
+ provide a mechanism for authorizing socket operations based on the
+ opener of a socket, which allows local users to bypass intended access
+ restrictions and modify network configurations by using a Netlink socket
+ for the (1) stdout or (2) stderr of a setuid program.
  
  Break-Fix: - -

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1312989

Title:
  CVE-2014-0181

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1312989/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to