The connector layer in the Linux kernel before 2.6.31.5 does not require the CAP_SYS_ADMIN capability for certain interaction with the (1) uvesafb, (2) pohmelfs, (3) dst, or (4) dm subsystem, which allows local users to bypass intended access restrictions and gain privileges via calls to functions in these subsystems.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=linux-kernel&m=125449888416314&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=oss-security&m=125715484511380&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=oss-security&m=125716192622235&w=2 - Mailing List, Third Party Advisory | |
References | () http://patchwork.kernel.org/patch/51382/ - Patch, Vendor Advisory | |
References | () http://patchwork.kernel.org/patch/51383/ - Patch, Vendor Advisory | |
References | () http://patchwork.kernel.org/patch/51384/ - Patch, Vendor Advisory | |
References | () http://patchwork.kernel.org/patch/51387/ - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/37113 - Third Party Advisory | |
References | () http://secunia.com/advisories/38905 - Third Party Advisory | |
References | () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.5 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/36834 - Patch, Third Party Advisory | |
References | () http://www.ubuntu.com/usn/usn-864-1 - Third Party Advisory | |
References | () http://xorl.wordpress.com/2009/10/31/linux-kernel-multiple-capabilities-missing-checks/ - Exploit, Third Party Advisory |
Information
Published : 2009-11-06 15:30
Updated : 2024-11-21 01:08
NVD link : CVE-2009-3725
Mitre link : CVE-2009-3725
CVE.ORG link : CVE-2009-3725
JSON object : View
Products Affected
canonical
- ubuntu_linux
linux
- linux_kernel
CWE
CWE-264
Permissions, Privileges, and Access Controls