The cap_bprm_set_creds function in security/commoncap.c in the Linux kernel before 3.3.3 does not properly handle the use of file system capabilities (aka fcaps) for implementing a privileged executable file, which allows local users to bypass intended personality restrictions via a crafted application, as demonstrated by an attack that uses a parent process to disable ASLR.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | * | 3.0.29 (excluding) |
Linux_kernel | Linux | 3.1 (including) | 3.2.16 (excluding) |
Linux_kernel | Linux | 3.3 (including) | 3.3.3 (excluding) |