The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
                
            References
                    | Link | Resource | 
|---|---|
| https://security-tracker.debian.org/tracker/CVE-2011-2910 | Third Party Advisory | 
| https://access.redhat.com/security/cve/cve-2011-2910 | Broken Link | 
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2910 | Issue Tracking Third Party Advisory | 
Information
                Published : 2019-11-15 09:15
Updated : 2019-11-26 07:08
NVD link : CVE-2011-2910
Mitre link : CVE-2011-2910
JSON object : View
CWE
                
                    
                        
                        CWE-269
                        
            Improper Privilege Management
Products Affected
                debian
- debian_linux
linux-ax25
- ax25-tools


