The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3cf521f7dc87c031617fd47e4b7aa2593c2f3daf - Broken Link, Third Party Advisory | |
References | () http://linux.oracle.com/errata/ELSA-2014-0924.html - Third Party Advisory | |
References | () http://linux.oracle.com/errata/ELSA-2014-3047.html - Third Party Advisory | |
References | () http://linux.oracle.com/errata/ELSA-2014-3048.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html - Mailing List, Third Party Advisory | |
References | () http://openwall.com/lists/oss-security/2014/07/17/1 - Mailing List, Third Party Advisory | |
References | () http://osvdb.org/show/osvdb/109277 - Broken Link | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1025.html - Third Party Advisory | |
References | () http://secunia.com/advisories/59790 - Third Party Advisory | |
References | () http://secunia.com/advisories/60011 - Third Party Advisory | |
References | () http://secunia.com/advisories/60071 - Third Party Advisory | |
References | () http://secunia.com/advisories/60220 - Third Party Advisory | |
References | () http://secunia.com/advisories/60380 - Third Party Advisory | |
References | () http://secunia.com/advisories/60393 - Third Party Advisory | |
References | () http://www.debian.org/security/2014/dsa-2992 - Third Party Advisory | |
References | () http://www.exploit-db.com/exploits/36267 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1030610 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1119458 - Issue Tracking, Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/94665 - Third Party Advisory, VDB Entry | |
References | () https://github.com/torvalds/linux/commit/3cf521f7dc87c031617fd47e4b7aa2593c2f3daf - Patch, Third Party Advisory |
19 Jan 2024, 17:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3cf521f7dc87c031617fd47e4b7aa2593c2f3daf - Broken Link, Third Party Advisory |
07 Nov 2023, 02:20
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2014-07-19 19:55
Updated : 2024-11-21 02:11
NVD link : CVE-2014-4943
Mitre link : CVE-2014-4943
CVE.ORG link : CVE-2014-4943
JSON object : View
Products Affected
opensuse
- opensuse
suse
- linux_enterprise_server
- linux_enterprise_desktop
redhat
- enterprise_linux_server_aus
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-269
Improper Privilege Management