Linux kernel built with the user name-spaces is vulnerable to an incorrect name-space check when spoofing PID in routine scm_check_creds(). This could lead to privilege escalation to gain root access to a system. A local user/program could use this flaw to escalate privileges to gain root access to the system. Upstream fix: ------------- -> https://git.kernel.org/linus/d661684cf6820331feae71146c35da83d794467e References: ----------- -> http://www.openwall.com/lists/oss-security/2013/09/05/3
Statement: Not vulnerable. This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.