CVE Vulnerabilities

CVE-2013-1979

Published: May 03, 2013 | Modified: Feb 13, 2023
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.9 MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
6.9 IMPORTANT
AV:L/AC:M/Au:N/C:C/I:C/A:C
RedHat/V3
Ubuntu
HIGH

The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.

Affected Software

Name Vendor Start Version End Version
Linux_kernel Linux * 3.8.10 (including)
Linux_kernel Linux 3.8.0 (including) 3.8.0 (including)
Linux_kernel Linux 3.8.1 (including) 3.8.1 (including)
Linux_kernel Linux 3.8.2 (including) 3.8.2 (including)
Linux_kernel Linux 3.8.3 (including) 3.8.3 (including)
Linux_kernel Linux 3.8.4 (including) 3.8.4 (including)
Linux_kernel Linux 3.8.5 (including) 3.8.5 (including)
Linux_kernel Linux 3.8.6 (including) 3.8.6 (including)
Linux_kernel Linux 3.8.7 (including) 3.8.7 (including)
Linux_kernel Linux 3.8.8 (including) 3.8.8 (including)
Linux_kernel Linux 3.8.9 (including) 3.8.9 (including)
Red Hat Enterprise MRG 2 RedHat kernel-rt-0:3.6.11.2-rt33.39.el6rt *
Linux Ubuntu oneiric *
Linux Ubuntu precise *
Linux Ubuntu quantal *
Linux Ubuntu raring *
Linux Ubuntu upstream *
Linux-armadaxp Ubuntu precise *
Linux-armadaxp Ubuntu quantal *
Linux-armadaxp Ubuntu upstream *
Linux-aws Ubuntu upstream *
Linux-ec2 Ubuntu upstream *
Linux-flo Ubuntu trusty *
Linux-flo Ubuntu trusty/esm *
Linux-flo Ubuntu upstream *
Linux-fsl-imx51 Ubuntu lucid *
Linux-fsl-imx51 Ubuntu upstream *
Linux-gke Ubuntu upstream *
Linux-goldfish Ubuntu saucy *
Linux-goldfish Ubuntu trusty *
Linux-goldfish Ubuntu trusty/esm *
Linux-goldfish Ubuntu upstream *
Linux-grouper Ubuntu saucy *
Linux-grouper Ubuntu trusty *
Linux-grouper Ubuntu upstream *
Linux-grouper Ubuntu utopic *
Linux-hwe Ubuntu upstream *
Linux-hwe-edge Ubuntu upstream *
Linux-linaro-omap Ubuntu oneiric *
Linux-linaro-omap Ubuntu precise *
Linux-linaro-omap Ubuntu quantal *
Linux-linaro-omap Ubuntu upstream *
Linux-linaro-shared Ubuntu oneiric *
Linux-linaro-shared Ubuntu precise *
Linux-linaro-shared Ubuntu quantal *
Linux-linaro-shared Ubuntu upstream *
Linux-linaro-vexpress Ubuntu oneiric *
Linux-linaro-vexpress Ubuntu precise *
Linux-linaro-vexpress Ubuntu quantal *
Linux-linaro-vexpress Ubuntu upstream *
Linux-lts-backport-maverick Ubuntu lucid *
Linux-lts-backport-maverick Ubuntu upstream *
Linux-lts-backport-oneiric Ubuntu lucid *
Linux-lts-backport-oneiric Ubuntu upstream *
Linux-lts-quantal Ubuntu precise *
Linux-lts-quantal Ubuntu upstream *
Linux-lts-raring Ubuntu upstream *
Linux-lts-trusty Ubuntu upstream *
Linux-lts-utopic Ubuntu upstream *
Linux-lts-vivid Ubuntu upstream *
Linux-lts-wily Ubuntu upstream *
Linux-lts-xenial Ubuntu upstream *
Linux-maguro Ubuntu saucy *
Linux-maguro Ubuntu trusty *
Linux-maguro Ubuntu upstream *
Linux-mako Ubuntu saucy *
Linux-mako Ubuntu trusty *
Linux-mako Ubuntu trusty/esm *
Linux-mako Ubuntu upstream *
Linux-manta Ubuntu saucy *
Linux-manta Ubuntu trusty *
Linux-manta Ubuntu trusty/esm *
Linux-manta Ubuntu upstream *
Linux-mvl-dove Ubuntu lucid *
Linux-mvl-dove Ubuntu upstream *
Linux-qcm-msm Ubuntu lucid *
Linux-qcm-msm Ubuntu oneiric *
Linux-qcm-msm Ubuntu precise *
Linux-qcm-msm Ubuntu quantal *
Linux-qcm-msm Ubuntu upstream *
Linux-raspi2 Ubuntu upstream *
Linux-raspi2 Ubuntu vivid/ubuntu-core *
Linux-snapdragon Ubuntu upstream *
Linux-ti-omap4 Ubuntu oneiric *
Linux-ti-omap4 Ubuntu precise *
Linux-ti-omap4 Ubuntu quantal *
Linux-ti-omap4 Ubuntu raring *
Linux-ti-omap4 Ubuntu upstream *

References