CVE-2013-1979

Published: 26 April 2013

The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.

From the Ubuntu security team

Andy Lutomirski discover an error in the Linux kernel's credential handling on unix sockets. A local user could exploit this flaw to gain administrative privileges.

Priority

High

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
Patches:
Introduced by 257b5358b32f17e0603b6ff57b13610b0e02348f
Fixed by 83f1b4ba917db5dc5a061a44b3403ddb6e783494
Introduced by 935d8aabd4331f47a89c3e1daa5779d23cf244ee
Fixed by 41c21e351e79004dbb4efa4bc14a53a7e0af38c5
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-lts-backport-oneiric
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (3.9~rc8)

Notes

AuthorNote
seth-arnold
41c21e351e79004dbb4efa4bc14a53a7e0af38c5 is additional hardening;
it does not on its own fix this CVE, nor will it get its own CVE number,
though it is useful enough to be included in an update. Andy recommended
applying in conjunction with 83f1b4ba917db5dc5a061a44b3403ddb6e783494.

References

Bugs