2017-10-16 12:31:07 -04:00
{
2019-03-18 01:37:14 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2013-7446" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
2017-10-16 12:31:07 -04:00
]
2019-03-18 01:37:14 +00:00
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "SUSE-SU-2016:0750" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html"
} ,
{
"name" : "https://groups.google.com/forum/#!topic/syzkaller/3twDUI4Cpm8" ,
"refsource" : "CONFIRM" ,
"url" : "https://groups.google.com/forum/#!topic/syzkaller/3twDUI4Cpm8"
} ,
{
"name" : "1034557" ,
"refsource" : "SECTRACK" ,
"url" : "http://www.securitytracker.com/id/1034557"
} ,
{
"name" : "SUSE-SU-2016:2010" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html"
} ,
{
"name" : "SUSE-SU-2016:2011" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html"
} ,
{
"name" : "SUSE-SU-2016:2003" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html"
} ,
{
"name" : "SUSE-SU-2016:0751" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html"
} ,
{
"name" : "SUSE-SU-2016:0747" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html"
} ,
{
"name" : "SUSE-SU-2016:0755" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html"
} ,
{
"name" : "SUSE-SU-2016:1994" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html"
} ,
{
"name" : "USN-2887-2" ,
"refsource" : "UBUNTU" ,
"url" : "http://www.ubuntu.com/usn/USN-2887-2"
} ,
{
"name" : "https://forums.grsecurity.net/viewtopic.php?f=3&t=4150" ,
"refsource" : "MISC" ,
"url" : "https://forums.grsecurity.net/viewtopic.php?f=3&t=4150"
} ,
{
"name" : "SUSE-SU-2016:0757" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html"
} ,
{
"name" : "SUSE-SU-2016:1961" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html"
} ,
{
"name" : "SUSE-SU-2016:2001" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html"
} ,
{
"name" : "[netdev] 20150304 [PATCH net] af_unix: don't poll dead peers" ,
"refsource" : "MLIST" ,
"url" : "http://www.spinics.net/lists/netdev/msg318826.html"
} ,
{
"name" : "SUSE-SU-2016:0753" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html"
} ,
{
"name" : "USN-2886-1" ,
"refsource" : "UBUNTU" ,
"url" : "http://www.ubuntu.com/usn/USN-2886-1"
} ,
{
"name" : "USN-2887-1" ,
"refsource" : "UBUNTU" ,
"url" : "http://www.ubuntu.com/usn/USN-2887-1"
} ,
{
"name" : "USN-2890-3" ,
"refsource" : "UBUNTU" ,
"url" : "http://www.ubuntu.com/usn/USN-2890-3"
} ,
{
"name" : "SUSE-SU-2016:2006" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html"
} ,
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c" ,
"refsource" : "CONFIRM" ,
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c"
} ,
{
"name" : "USN-2889-1" ,
"refsource" : "UBUNTU" ,
"url" : "http://www.ubuntu.com/usn/USN-2889-1"
} ,
{
"name" : "SUSE-SU-2016:2014" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html"
} ,
{
"name" : "openSUSE-SU-2016:1641" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html"
} ,
{
"name" : "USN-2889-2" ,
"refsource" : "UBUNTU" ,
"url" : "http://www.ubuntu.com/usn/USN-2889-2"
} ,
{
"name" : "SUSE-SU-2016:0746" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html"
} ,
{
"name" : "[linux-kernel] 20150913 List corruption on epoll_ctl(EPOLL_CTL_DEL) an AF_UNIX socket" ,
"refsource" : "MLIST" ,
"url" : "https://lkml.org/lkml/2015/9/13/195"
} ,
{
"name" : "SUSE-SU-2016:0749" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00037.html"
} ,
{
"name" : "SUSE-SU-2016:1102" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html"
} ,
{
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3" ,
"refsource" : "CONFIRM" ,
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3"
} ,
{
"name" : "77638" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/77638"
} ,
{
"name" : "SUSE-SU-2016:2009" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html"
} ,
{
"name" : "SUSE-SU-2016:2005" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html"
} ,
{
"name" : "[linux-kernel] 20140515 eventpoll __list_del_entry corruption (was: perf: use after free in perf_remove_from_context)" ,
"refsource" : "MLIST" ,
"url" : "https://lkml.org/lkml/2014/5/15/532"
} ,
{
"name" : "SUSE-SU-2016:2007" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html"
} ,
{
"name" : "SUSE-SU-2016:2074" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"
} ,
{
"name" : "USN-2890-2" ,
"refsource" : "UBUNTU" ,
"url" : "http://www.ubuntu.com/usn/USN-2890-2"
} ,
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1282688" ,
"refsource" : "CONFIRM" ,
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1282688"
} ,
{
"name" : "SUSE-SU-2016:2000" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html"
} ,
{
"name" : "SUSE-SU-2016:0745" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html"
} ,
{
"name" : "DSA-3426" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2015/dsa-3426"
} ,
{
"name" : "SUSE-SU-2016:1995" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html"
} ,
{
"name" : "[oss-security] 20151118 Re: CVE request - Linux kernel - Unix sockets use after free - peer_wait_queue prematurely freed" ,
"refsource" : "MLIST" ,
"url" : "http://www.openwall.com/lists/oss-security/2015/11/18/16"
} ,
{
"name" : "SUSE-SU-2016:2002" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html"
} ,
{
"name" : "[linux-kernel] 20131014 Re: epoll oops." ,
"refsource" : "MLIST" ,
"url" : "https://lkml.org/lkml/2013/10/14/424"
} ,
{
"name" : "SUSE-SU-2016:0756" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html"
} ,
{
"name" : "https://github.com/torvalds/linux/commit/7d267278a9ece963d77eefec61630223fce08c6c" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/torvalds/linux/commit/7d267278a9ece963d77eefec61630223fce08c6c"
} ,
{
"name" : "USN-2890-1" ,
"refsource" : "UBUNTU" ,
"url" : "http://www.ubuntu.com/usn/USN-2890-1"
} ,
{
"name" : "SUSE-SU-2016:0754" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00042.html"
} ,
{
"name" : "SUSE-SU-2016:0752" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html"
} ,
{
"name" : "USN-2888-1" ,
"refsource" : "UBUNTU" ,
"url" : "http://www.ubuntu.com/usn/USN-2888-1"
} ,
{
"name" : "SUSE-SU-2016:0911" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html"
}
]
}
}