Submitted by Vincent (CVE) Danen on Fri, 09/18/2015 - 06:00
The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5 and 6.
This issue was addressed in Red Hat Enterprise MRG 2 via RHSA-2013:0829 https://rhn.redhat.com/errata/RHSA-2013-0829.html
CVE-2013-1979 kernel: net: incorrect SCM_CREDENTIALS passing
Red Hat would like to thank Andy Lutomirski for reporting this issue.
Red Hat Security Errata
|MRG Grid for RHEL 6 Server v.2 (kernel-rt)||RHSA-2013:0829||2013-05-20|
Affected Packages State
|Red Hat Enterprise MRG 2||realtime-kernel||Affected|
|Red Hat Enterprise Linux 6||kernel||Not affected|
|Red Hat Enterprise Linux 5||kernel||Not affected|