CVE-2013-1958

Linux Kernel < 3.8.5 - Access Control

Title source: rule
STIX 2.1

Description

The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.

Scores

EPSS 0.0004
EPSS Percentile 11.8%

Details

CWE
CWE-264
Status published
Products (6)
linux/linux_kernel 3.8.0
linux/linux_kernel 3.8.1
linux/linux_kernel 3.8.2
linux/linux_kernel 3.8.3
linux/linux_kernel 3.8.4
linux/linux_kernel < 3.8.5
Published Apr 24, 2013
Tracked Since Feb 18, 2026