Vulnerability CVE-2013-6383: Information

Description

The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

Published: Nov. 27, 2013
Modified: Dec. 15, 2023
Error type identifier: CWE-264

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
kernel-image-el-defc72.6.32-alt222.6.32-alt22ALT-PU-2014-1659-1119843Fixed
kernel-image-std-defsisyphus3.12.15-alt16.1.87-alt1ALT-PU-2014-1422-1117249Fixed
kernel-image-std-defp103.12.15-alt15.10.213-alt1ALT-PU-2014-1422-1117249Fixed
kernel-image-std-defp93.12.15-alt15.4.274-alt1ALT-PU-2014-1422-1117249Fixed
kernel-image-std-defc9f23.12.15-alt15.10.214-alt0.c9f.2ALT-PU-2014-1422-1117249Fixed
kernel-image-std-defc73.12.15-alt14.4.277-alt0.M70C.1ALT-PU-2014-1438-1117641Fixed
kernel-image-un-defsisyphus3.11.8-alt16.6.28-alt1ALT-PU-2013-1133-1108369Fixed
kernel-image-un-defp103.11.8-alt16.1.85-alt1ALT-PU-2013-1133-1108369Fixed
kernel-image-un-defp93.11.8-alt15.10.215-alt1ALT-PU-2013-1133-1108369Fixed
kernel-image-un-defc10f13.11.8-alt16.1.85-alt0.c10f.1ALT-PU-2013-1133-1108369Fixed
kernel-image-un-defc9f23.11.8-alt15.10.29-alt2ALT-PU-2013-1133-1108369Fixed
kernel-image-un-defc73.12.7-alt14.9.277-alt0.M70C.1ALT-PU-2014-1047-1111766Fixed
usbipsisyphus5.10-alt15.10-alt1ALT-PU-2023-1798-1320453Fixed
usbipsisyphus_e2k5.10-alt15.10-alt1ALT-PU-2023-7452-1-Fixed
usbipp105.10-alt15.10-alt1ALT-PU-2023-1903-1320461Fixed
usbipp10_e2k5.10-alt15.10-alt1ALT-PU-2023-7498-1-Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.8
  • Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1033530
  • Issue Tracking
https://github.com/torvalds/linux/commit/f856567b930dfcdbc3323261bf77240ccdde01f5
  • Patch
[oss-security] 20131122 Linux kernel CVE fixes
  • Mailing List
USN-2069-1
  • Third Party Advisory
USN-2071-1
  • Third Party Advisory
USN-2066-1
  • Third Party Advisory
USN-2075-1
  • Third Party Advisory
USN-2068-1
  • Third Party Advisory
USN-2070-1
  • Third Party Advisory
USN-2067-1
  • Third Party Advisory
USN-2076-1
  • Third Party Advisory
USN-2074-1
  • Third Party Advisory
USN-2072-1
  • Third Party Advisory
USN-2073-1
  • Third Party Advisory
RHSA-2014:0100
  • Third Party Advisory
USN-2108-1
  • Third Party Advisory
USN-2107-1
  • Third Party Advisory
RHSA-2014:0285
  • Third Party Advisory
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f856567b930dfcdbc3323261bf77240ccdde01f5
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.11
      End excliding
      3.11.8

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.5
      End excliding
      3.10.19

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.3
      End excliding
      3.4.69

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      2.6.12
      End excliding
      3.2.53