First published: Tue Apr 23 2013(Updated: )
Commit 257b5358b32f ("scm: Capture the full credentials of the scm sender") changed the credentials passing code to pass in the effective uid/gid instead of the real uid/gid. Obviously this doesn't matter most of the time (since normally they are the same), but it results in differences for suid binaries when the wrong uid/gid ends up being used. An unprivileged local user could use this flaw to elevate their privileges. Upstream fix: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=83f1b4ba917db5dc5a061a44b3403ddb6e783494">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=83f1b4ba917db5dc5a061a44b3403ddb6e783494</a> Acknowledgements: Red Hat would like to thank Andy Lutomirski for reporting this issue.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=3.8.10 | |
Linux Linux kernel | =3.8.0 | |
Linux Linux kernel | =3.8.1 | |
Linux Linux kernel | =3.8.2 | |
Linux Linux kernel | =3.8.3 | |
Linux Linux kernel | =3.8.4 | |
Linux Linux kernel | =3.8.5 | |
Linux Linux kernel | =3.8.6 | |
Linux Linux kernel | =3.8.7 | |
Linux Linux kernel | =3.8.8 | |
Linux Linux kernel | =3.8.9 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.