The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | * | 3.8.10 (including) |
Linux_kernel | Linux | 3.8.0 (including) | 3.8.0 (including) |
Linux_kernel | Linux | 3.8.1 (including) | 3.8.1 (including) |
Linux_kernel | Linux | 3.8.2 (including) | 3.8.2 (including) |
Linux_kernel | Linux | 3.8.3 (including) | 3.8.3 (including) |
Linux_kernel | Linux | 3.8.4 (including) | 3.8.4 (including) |
Linux_kernel | Linux | 3.8.5 (including) | 3.8.5 (including) |
Linux_kernel | Linux | 3.8.6 (including) | 3.8.6 (including) |
Linux_kernel | Linux | 3.8.7 (including) | 3.8.7 (including) |
Linux_kernel | Linux | 3.8.8 (including) | 3.8.8 (including) |
Linux_kernel | Linux | 3.8.9 (including) | 3.8.9 (including) |