7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
kernel is vulnerable to privilege escalation. The vulnerability exists through buffer overflow flaws in the Linux kernel’s netlink-based wireless configuration interface implementation could allow a local user, who has the CAP_NET_ADMIN capability, to cause a denial of service or escalate their privileges on systems that have an active wireless interface.
ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.2
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=208c72f4fe44fe09577e7975ba0e7fa0278f3d03
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=208c72f4fe44fe09577e7975ba0e7fa0278f3d03
rhn.redhat.com/errata/RHSA-2011-1212.html
www.openwall.com/lists/oss-security/2011/07/01/4
access.redhat.com/errata/RHSA-2011:1212
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=718152
docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/kernel.html#RHSA-2011-1212
github.com/torvalds/linux/commit/208c72f4fe44fe09577e7975ba0e7fa0278f3d03