kernel: privilege escalation
Package(s): | kernel | CVE #(s): | CVE-2006-2451 | ||||||||||||||||||||||||||||
Created: | July 7, 2006 | Updated: | July 26, 2006 | ||||||||||||||||||||||||||||
Description: | The Linux kernel, versions 2.6.13 through 2.6.17.3, has a privilege escalation vulnerability that is related to the handling of core dumps. Local users can create a program that can core dump to a directory that the user does not have permission to write to. This can be exploited for the use of a disk consumption denial of service attack, or the unauthorized gaining of root privileges. | ||||||||||||||||||||||||||||||
Alerts: |
|
Posted Jul 13, 2006 16:12 UTC (Thu)
by mattdm (subscriber, #18)
[Link] (1 responses)
Posted Jul 13, 2006 16:17 UTC (Thu)
by corbet (editor, #1)
[Link]
As I understand it, this bug affects 2.6.13 and up, and only is an issue in 2.6.9 because RHEL backported the feature in which the problem occurs. Can someone confirm this?kernel: privilege escalation
Your understanding is correct - the bug was introduced in 2.6.13. The original wording of this entry was incorrect - fixing it now.
kernel: privilege escalation