{"id":"CVE-2013-4270","details":"The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.","modified":"2025-08-09T19:01:28Z","published":"2013-12-09T18:55:09Z","references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-0100.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2049-1"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1027752"},{"type":"WEB","url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2433c8f094a008895e66f25bd1773cdb01c91d01"},{"type":"WEB","url":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5"}],"schema_version":"1.7.3"}