Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2013-1958

Published: 24 April 2013

The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.

Priority

Medium

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
hardy Not vulnerable

lucid Not vulnerable

oneiric Not vulnerable

precise Not vulnerable

quantal Not vulnerable

upstream
Released (3.9~rc5)
Patches:
Introduced by

49f4d8b93ccf9454284b6f524b96c66d8d7fbccc

Fixed by 92f28d973cce45ef5823209aab3138eb45d8b349
linux-armadaxp
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

oneiric Does not exist

precise Not vulnerable

quantal Not vulnerable

upstream
Released (3.9~rc5)
This package is not directly supported by the Ubuntu Security Team
linux-ec2
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Not vulnerable

oneiric Does not exist

precise Does not exist

quantal Does not exist

upstream
Released (3.9~rc5)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Ignored
(end of life)
oneiric Does not exist

precise Does not exist

quantal Does not exist

upstream
Released (3.9~rc5)
linux-linaro-omap
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

oneiric Ignored
(end of life)
precise Ignored
(end of life)
quantal Ignored
(end of life)
upstream
Released (3.9~rc5)
linux-linaro-shared
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

oneiric Ignored
(end of life)
precise Ignored
(end of life)
quantal Ignored
(end of life)
upstream
Released (3.9~rc5)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

oneiric Ignored
(end of life)
precise Ignored
(end of life)
quantal Ignored
(end of life)
upstream
Released (3.9~rc5)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Ignored
(end of life)
oneiric Does not exist

precise Does not exist

quantal Does not exist

upstream
Released (3.9~rc5)
linux-lts-backport-oneiric
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Not vulnerable

oneiric Does not exist

precise Does not exist

quantal Does not exist

upstream
Released (3.9~rc5)
linux-lts-quantal
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

oneiric Does not exist

precise Not vulnerable

quantal Does not exist

upstream
Released (3.9~rc5)
linux-mvl-dove
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Ignored
(end of life)
oneiric Does not exist

precise Does not exist

quantal Does not exist

upstream
Released (3.9~rc5)
linux-qcm-msm
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Ignored
(end of life)
oneiric Ignored
(end of life)
precise Ignored
(end of life)
quantal Ignored
(end of life)
upstream
Released (3.9~rc5)
linux-ti-omap4
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

oneiric Not vulnerable

precise Not vulnerable

quantal Not vulnerable

upstream
Released (3.9~rc5)