CVE-2014-0181
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0003 (0.0%)
Percentile: 7.0%
EPSS: 2026-05-06
Affects
linux:linux_kernelopensuse:evergreenredhat:enterprise_linux_desktopredhat:enterprise_linux_serversuse:linux_enterprise_real_time_extensionsuse:linux_enterprise_serversuse:suse_linux_enterprise_serverTechnical description
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
Published: 4/27/2014, 12:55:05 AM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
- http://marc.info/?l=linux-netdev&m=139828832919748&w=2
- http://rhn.redhat.com/errata/RHSA-2014-1959.html
- http://www.openwall.com/lists/oss-security/2014/04/23/6