Linux kernel built with the user name-spaces is vulnerable to an incorrect
name-space check when spoofing PID in routine scm_check_creds(). This could
lead to privilege escalation to gain root access to a system.
A local user/program could use this flaw to escalate privileges to gain root
access to the system.
This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.