Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-6383

Опубликовано: 27 нояб. 2013
Источник: debian

Описание

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6removedpackage
linuxfixed3.2.53-1wheezypackage
linuxfixed3.11.8-1package

Примечания

  • https://git.kernel.org/linus/f856567b930dfcdbc3323261bf77240ccdde01f5

Связанные уязвимости

ubuntu
почти 12 лет назад

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

redhat
почти 12 лет назад

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

nvd
почти 12 лет назад

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

github
больше 3 лет назад

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

oracle-oval
больше 11 лет назад

ELSA-2014-3023: Unbreakable Enterprise kernel security update (IMPORTANT)