CVE-2013-1958
Publication date 24 April 2013
Last updated 24 July 2024
Ubuntu priority
The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-armadaxp | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-linaro-omap | ||
linux-linaro-shared | ||
linux-linaro-vexpress | ||
linux-lts-backport-maverick | ||
linux-lts-backport-oneiric | ||
linux-lts-quantal | ||
linux-mvl-dove | ||
linux-qcm-msm | ||
linux-ti-omap4 | ||