CVE-2013-4300

Linux Kernel < 3.9 - Access Control

Title source: rule
STIX 2.1

Description

The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.11 performs a capability check in an incorrect namespace, which allows local users to gain privileges via PID spoofing.

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-1995-1
Exploit, Issue Tracking, Patch x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1004736
Exploit, Mailing List, Patch mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2013/09/05/3
Third Party Advisory, VDB Entry vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-1998-1

Scores

EPSS 0.0004
EPSS Percentile 12.6%

Details

CWE
CWE-264
Status published
Products (2)
linux/linux_kernel 3.9 rc1 (4 CPE variants)
linux/linux_kernel 3.8.6 - 3.9
Published Sep 25, 2013
Tracked Since Feb 18, 2026