CVE-2013-1792
Kernel: keys: race condition in install_user_keyrings()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Race condition in the install_user_keyrings function in security/keys/process_keys.c in the Linux kernel before 3.8.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) via crafted keyctl system calls that trigger keyring operations in simultaneous threads.
Condición de carrera en la función install_user_keyrings en ??security/keys/process_keys.c en el kernel de Linux anterior a v3.8.3 que permite a usuarios locales provocar una denegación de servicio (desreferencia puntero NULL y caída del sistema) a través de la manipulación del sistema keyctl que dispara operaciones de verificación simultáneamente en varios hilos.
Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 6. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way the Intel i915 driver in the Linux kernel handled the allocation of the buffer used for relocation copies. A local user with console access could use this flaw to cause a denial of service or escalate their privileges. A buffer overflow flaw was found in the way UTF-8 characters were converted to UTF-16 in the utf8s_to_utf16s() function of the Linux kernel's FAT file system implementation. A local user able to mount a FAT file system with the "utf8=1" option could use this flaw to crash the system or, potentially, to escalate their privileges.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-02-19 CVE Reserved
- 2013-03-22 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (19)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0da9dfdd2cd9889201bc6f6f43580c99165cd087 | X_refsource_confirm | |
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.3 | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2013/03/07/1 | Mailing List |
|
https://github.com/torvalds/linux/commit/0da9dfdd2cd9889201bc6f6f43580c99165cd087 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html | 2023-02-13 | |
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html | 2023-02-13 | |
http://rhn.redhat.com/errata/RHSA-2013-0744.html | 2023-02-13 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 | 2023-02-13 | |
http://www.ubuntu.com/usn/USN-1787-1 | 2023-02-13 | |
http://www.ubuntu.com/usn/USN-1788-1 | 2023-02-13 | |
http://www.ubuntu.com/usn/USN-1792-1 | 2023-02-13 | |
http://www.ubuntu.com/usn/USN-1793-1 | 2023-02-13 | |
http://www.ubuntu.com/usn/USN-1794-1 | 2023-02-13 | |
http://www.ubuntu.com/usn/USN-1795-1 | 2023-02-13 | |
http://www.ubuntu.com/usn/USN-1796-1 | 2023-02-13 | |
http://www.ubuntu.com/usn/USN-1797-1 | 2023-02-13 | |
http://www.ubuntu.com/usn/USN-1798-1 | 2023-02-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=916646 | 2013-05-20 | |
https://access.redhat.com/security/cve/CVE-2013-1792 | 2013-05-20 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 3.8.2 Search vendor "Linux" for product "Linux Kernel" and version " <= 3.8.2" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 3.8.0 Search vendor "Linux" for product "Linux Kernel" and version "3.8.0" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 3.8.1 Search vendor "Linux" for product "Linux Kernel" and version "3.8.1" | - |
Affected
|