Description
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-0233 | The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program. |
Ubuntu USN |
USN-2336-1 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-2337-1 | Linux kernel vulnerabilities |
References
History
No history.
Subscriptions
Linux
Subscribe
Linux Kernel
Subscribe
Opensuse
Subscribe
Evergreen
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Mrg
Subscribe
Suse
Subscribe
Linux Enterprise Real Time Extension
Subscribe
Linux Enterprise Server
Subscribe
Suse Linux Enterprise Server
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-02-13T16:27:11.367Z
Reserved: 2013-12-03T00:00:00.000Z
Link: CVE-2014-0181
No data.
Status : Deferred
Published: 2014-04-27T00:55:05.750
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-0181
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN