Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-4542

Опубликовано: 28 фев. 2013
Источник: debian
EPSS Низкий

Описание

block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxunfixedpackage
linux-2.6removedpackage
linux-2.6no-dsasqueezepackage

Примечания

  • No upstream fix seems to be planned/treated as non-issue. Marking as unimportant

EPSS

Процентиль: 16%
0.00051
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.

redhat
больше 12 лет назад

block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.

nvd
больше 12 лет назад

block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.

github
около 3 лет назад

block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.

oracle-oval
около 12 лет назад

ELSA-2013-2523: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

EPSS

Процентиль: 16%
0.00051
Низкий