Public Date:
CWE-129 -> CWE-119
915052: CVE-2013-1763 kernel: sock_diag: out-of-bounds access to sock_diag_handlers[]

The MITRE CVE dictionary describes this issue as:

Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in the Linux kernel before 3.7.10 allows local users to gain privileges via a large family value in a Netlink message.

Find out more about CVE-2013-1763 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue did not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 and 6. This issue was addressed in Red Hat Enterprise MRG 2 via RHSA-2013:0622

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 7.2
Base Metrics AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2013:0622 2013-03-11

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 6 kernel Not affected
Red Hat Enterprise Linux 5 kernel Not affected