First published: Fri Sep 13 2013(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=3.8<3.10.16 | |
Linux kernel | >=3.11<3.11.5 | |
Ubuntu Linux | =13.04 | |
Ubuntu Linux | =13.10 | |
Linux Kernel | >=3.8<3.10.16 | |
Linux Kernel | >=3.11<3.11.5 | |
Ubuntu | =13.04 | |
Ubuntu | =13.10 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4343 is considered a privilege escalation vulnerability due to a use-after-free flaw in the Linux kernel.
The vulnerability CVE-2013-4343 can be fixed by upgrading to patched versions of the Linux kernel, specifically versions 3.10.16 and 3.11.5 or later.
CVE-2013-4343 affects various Linux kernel versions between 3.8 and 3.10.16, as well as Ubuntu Linux versions 13.04 and 13.10.
While there are no specific public exploits for CVE-2013-4343 detailed, the vulnerability itself could be exploited by a privileged user.
Only users with CAP_NET_ADMIN privileges can potentially exploit CVE-2013-4343 due to its nature as a privilege escalation vulnerability.