Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-6383

Опубликовано: 27 нояб. 2013
Источник: debian
EPSS Низкий

Описание

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6removedpackage
linuxfixed3.2.53-1wheezypackage
linuxfixed3.11.8-1package

Примечания

  • https://git.kernel.org/linus/f856567b930dfcdbc3323261bf77240ccdde01f5

EPSS

Процентиль: 8%
0.00033
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

redhat
больше 11 лет назад

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

nvd
больше 11 лет назад

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

github
около 3 лет назад

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

oracle-oval
около 11 лет назад

ELSA-2014-3023: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 8%
0.00033
Низкий