First published: Sun Feb 24 2013(Updated: )
Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in the Linux kernel before 3.7.10 allows local users to gain privileges via a large family value in a Netlink message.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=3.3<3.4.34 | |
Linux Kernel | >=3.5<3.7.10 | |
Linux Kernel | >=3.8<3.8.1 | |
Linux Kernel | <=3.7.9 | |
Linux Kernel | =3.0-rc1 | |
Linux Kernel | =3.0-rc2 | |
Linux Kernel | =3.0-rc3 | |
Linux Kernel | =3.0-rc4 | |
Linux Kernel | =3.0-rc5 | |
Linux Kernel | =3.0-rc6 | |
Linux Kernel | =3.0-rc7 | |
Linux Kernel | =3.0.1 | |
Linux Kernel | =3.0.2 | |
Linux Kernel | =3.0.3 | |
Linux Kernel | =3.0.4 | |
Linux Kernel | =3.0.5 | |
Linux Kernel | =3.0.6 | |
Linux Kernel | =3.0.7 | |
Linux Kernel | =3.0.8 | |
Linux Kernel | =3.0.9 | |
Linux Kernel | =3.0.10 | |
Linux Kernel | =3.0.11 | |
Linux Kernel | =3.0.12 | |
Linux Kernel | =3.0.13 | |
Linux Kernel | =3.0.14 | |
Linux Kernel | =3.0.15 | |
Linux Kernel | =3.0.16 | |
Linux Kernel | =3.0.17 | |
Linux Kernel | =3.0.18 | |
Linux Kernel | =3.0.19 | |
Linux Kernel | =3.0.20 | |
Linux Kernel | =3.0.21 | |
Linux Kernel | =3.0.22 | |
Linux Kernel | =3.0.23 | |
Linux Kernel | =3.0.24 | |
Linux Kernel | =3.0.25 | |
Linux Kernel | =3.0.26 | |
Linux Kernel | =3.0.27 | |
Linux Kernel | =3.0.28 | |
Linux Kernel | =3.0.29 | |
Linux Kernel | =3.0.30 | |
Linux Kernel | =3.0.31 | |
Linux Kernel | =3.0.32 | |
Linux Kernel | =3.0.33 | |
Linux Kernel | =3.0.34 | |
Linux Kernel | =3.0.35 | |
Linux Kernel | =3.0.36 | |
Linux Kernel | =3.0.37 | |
Linux Kernel | =3.0.38 | |
Linux Kernel | =3.0.39 | |
Linux Kernel | =3.0.40 | |
Linux Kernel | =3.0.41 | |
Linux Kernel | =3.0.42 | |
Linux Kernel | =3.0.43 | |
Linux Kernel | =3.0.44 | |
Linux Kernel | =3.1 | |
Linux Kernel | =3.1-rc1 | |
Linux Kernel | =3.1-rc2 | |
Linux Kernel | =3.1-rc3 | |
Linux Kernel | =3.1-rc4 | |
Linux Kernel | =3.1.1 | |
Linux Kernel | =3.1.2 | |
Linux Kernel | =3.1.3 | |
Linux Kernel | =3.1.4 | |
Linux Kernel | =3.1.5 | |
Linux Kernel | =3.1.6 | |
Linux Kernel | =3.1.7 | |
Linux Kernel | =3.1.8 | |
Linux Kernel | =3.1.9 | |
Linux Kernel | =3.1.10 | |
Linux Kernel | =3.2 | |
Linux Kernel | =3.2-rc2 | |
Linux Kernel | =3.2-rc3 | |
Linux Kernel | =3.2-rc4 | |
Linux Kernel | =3.2-rc5 | |
Linux Kernel | =3.2-rc6 | |
Linux Kernel | =3.2-rc7 | |
Linux Kernel | =3.2.1 | |
Linux Kernel | =3.2.2 | |
Linux Kernel | =3.2.3 | |
Linux Kernel | =3.2.4 | |
Linux Kernel | =3.2.5 | |
Linux Kernel | =3.2.6 | |
Linux Kernel | =3.2.7 | |
Linux Kernel | =3.2.8 | |
Linux Kernel | =3.2.9 | |
Linux Kernel | =3.2.10 | |
Linux Kernel | =3.2.11 | |
Linux Kernel | =3.2.12 | |
Linux Kernel | =3.2.13 | |
Linux Kernel | =3.2.14 | |
Linux Kernel | =3.2.15 | |
Linux Kernel | =3.2.16 | |
Linux Kernel | =3.2.17 | |
Linux Kernel | =3.2.18 | |
Linux Kernel | =3.2.19 | |
Linux Kernel | =3.2.20 | |
Linux Kernel | =3.2.21 | |
Linux Kernel | =3.2.22 | |
Linux Kernel | =3.2.23 | |
Linux Kernel | =3.2.24 | |
Linux Kernel | =3.2.25 | |
Linux Kernel | =3.2.26 | |
Linux Kernel | =3.2.27 | |
Linux Kernel | =3.2.28 | |
Linux Kernel | =3.2.29 | |
Linux Kernel | =3.2.30 | |
Linux Kernel | =3.3 | |
Linux Kernel | =3.3-rc1 | |
Linux Kernel | =3.3-rc2 | |
Linux Kernel | =3.3-rc3 | |
Linux Kernel | =3.3-rc4 | |
Linux Kernel | =3.3-rc5 | |
Linux Kernel | =3.3-rc6 | |
Linux Kernel | =3.3-rc7 | |
Linux Kernel | =3.3.1 | |
Linux Kernel | =3.3.2 | |
Linux Kernel | =3.3.3 | |
Linux Kernel | =3.3.4 | |
Linux Kernel | =3.3.5 | |
Linux Kernel | =3.3.6 | |
Linux Kernel | =3.3.7 | |
Linux Kernel | =3.3.8 | |
Linux Kernel | =3.4 | |
Linux Kernel | =3.4-rc1 | |
Linux Kernel | =3.4-rc2 | |
Linux Kernel | =3.4-rc3 | |
Linux Kernel | =3.4-rc4 | |
Linux Kernel | =3.4-rc5 | |
Linux Kernel | =3.4-rc6 | |
Linux Kernel | =3.4-rc7 | |
Linux Kernel | =3.4.1 | |
Linux Kernel | =3.4.2 | |
Linux Kernel | =3.4.3 | |
Linux Kernel | =3.4.4 | |
Linux Kernel | =3.4.5 | |
Linux Kernel | =3.4.6 | |
Linux Kernel | =3.4.7 | |
Linux Kernel | =3.4.8 | |
Linux Kernel | =3.4.9 | |
Linux Kernel | =3.4.10 | |
Linux Kernel | =3.4.11 | |
Linux Kernel | =3.4.12 | |
Linux Kernel | =3.4.13 | |
Linux Kernel | =3.4.14 | |
Linux Kernel | =3.4.15 | |
Linux Kernel | =3.4.16 | |
Linux Kernel | =3.4.17 | |
Linux Kernel | =3.4.18 | |
Linux Kernel | =3.4.19 | |
Linux Kernel | =3.4.20 | |
Linux Kernel | =3.4.21 | |
Linux Kernel | =3.4.22 | |
Linux Kernel | =3.4.23 | |
Linux Kernel | =3.4.24 | |
Linux Kernel | =3.5.1 | |
Linux Kernel | =3.5.2 | |
Linux Kernel | =3.5.3 | |
Linux Kernel | =3.5.4 | |
Linux Kernel | =3.5.5 | |
Linux Kernel | =3.5.6 | |
Linux Kernel | =3.5.7 | |
Linux Kernel | =3.6 | |
Linux Kernel | =3.6.1 | |
Linux Kernel | =3.6.2 | |
Linux Kernel | =3.6.3 | |
Linux Kernel | =3.6.4 | |
Linux Kernel | =3.6.5 | |
Linux Kernel | =3.6.6 | |
Linux Kernel | =3.6.7 | |
Linux Kernel | =3.6.8 | |
Linux Kernel | =3.6.9 | |
Linux Kernel | =3.6.10 | |
Linux Kernel | =3.6.11 | |
Linux Kernel | =3.7 | |
Linux Kernel | =3.7.1 | |
Linux Kernel | =3.7.2 | |
Linux Kernel | =3.7.3 | |
Linux Kernel | =3.7.4 | |
Linux Kernel | =3.7.5 | |
Linux Kernel | =3.7.6 | |
Linux Kernel | =3.7.7 | |
Linux Kernel | =3.7.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1763 has been rated as a high severity vulnerability due to its potential to allow local users to gain elevated privileges on affected systems.
To fix CVE-2013-1763, upgrade the Linux kernel to version 3.7.10 or later, as this version addresses the vulnerability.
CVE-2013-1763 affects Linux kernel versions prior to 3.7.10, as well as certain versions including 3.0-3.6.
CVE-2013-1763 is an array index error in the __sock_diag_rcv_msg function, leading to out-of-bounds memory access.
Yes, unprivileged users can exploit CVE-2013-1763 to send a malicious Netlink message that results in privilege escalation.