Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-6383

Опубликовано: 22 нояб. 2013
Источник: redhat
CVSS2: 6.2
EPSS Низкий

Описание

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 5kernelFixedRHSA-2014:028512.03.2014
Red Hat Enterprise Linux 5.9 Extended Update SupportkernelFixedRHSA-2014:047607.05.2014
Red Hat Enterprise Linux 6kernelFixedRHSA-2014:047507.05.2014
Red Hat Enterprise Linux 6.4 Extended Update SupportkernelFixedRHSA-2014:063404.06.2014
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2014:010028.01.2014

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1033530Kernel: AACRAID Driver compat IOCTL missing capability check

EPSS

Процентиль: 5%
0.00025
Низкий

6.2 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

nvd
почти 12 лет назад

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

debian
почти 12 лет назад

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the L ...

github
больше 3 лет назад

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

oracle-oval
больше 11 лет назад

ELSA-2014-3023: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 5%
0.00025
Низкий

6.2 Medium

CVSS2

Уязвимость CVE-2013-6383