First published: Thu Dec 23 2004(Updated: )
The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Realtime Linux Security Module | =0.8.7 | |
Conectiva Linux | =10.0 | |
Ubuntu | =4.1 | |
Ubuntu | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1337 is considered a high severity vulnerability due to its potential to allow local users to gain elevated privileges.
To fix CVE-2004-1337, ensure that the POSIX Capability Linux Security Module is properly loaded before launching processes.
CVE-2004-1337 affects systems running Linux kernel 2.6, specifically versions of Gnu Realtime Linux Security Module and certain Ubuntu and Conectiva Linux distributions.
Local users with access to the system can exploit CVE-2004-1337 to gain unauthorized privileges.
Yes, a patch to address CVE-2004-1337 is typically provided in system updates for affected Linux distributions.