CVE-2013-1979

Linux Kernel < 3.8.10 - Access Control

Title source: rule
STIX 2.1

Description

The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.

References (13)

Core 13
Core References
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=955629
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2013:176
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103750.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104480.html
Mailing List mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2013/04/29/1
Mailing List vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html

Scores

EPSS 0.0005
EPSS Percentile 16.5%

Details

CWE
CWE-264
Status published
Products (11)
linux/linux_kernel 3.8.0
linux/linux_kernel 3.8.1
linux/linux_kernel 3.8.2
linux/linux_kernel 3.8.3
linux/linux_kernel 3.8.4
linux/linux_kernel 3.8.5
linux/linux_kernel 3.8.6
linux/linux_kernel 3.8.7
linux/linux_kernel 3.8.8
linux/linux_kernel 3.8.9
... and 1 more
Published May 03, 2013
Tracked Since Feb 18, 2026