Описание
Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
Ссылки
- Permissions RequiredThird Party Advisory
- Permissions RequiredThird Party Advisory
- Permissions RequiredThird Party Advisory
- Permissions RequiredThird Party Advisory
- Permissions RequiredThird Party Advisory
- Third Party Advisory
- Broken Link
- Broken Link
- Not Applicable
- Not Applicable
- Third Party AdvisoryVDB Entry
- Broken Link
- Permissions RequiredThird Party Advisory
Уязвимые конфигурации
Одно из
EPSS
4.6 Medium
CVSS2
Дефекты
Связанные уязвимости
Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
Linux kernel 2.6.x does not properly restrict socket policy access to ...
Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
EPSS
4.6 Medium
CVSS2