Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-3224

Опубликовано: 22 апр. 2013
Источник: debian
EPSS Низкий

Описание

The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6removedpackage
linuxfixed3.8.11-1package

EPSS

Процентиль: 24%
0.00078
Низкий

Связанные уязвимости

ubuntu
около 12 лет назад

The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.

redhat
около 12 лет назад

The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.

nvd
около 12 лет назад

The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.

github
около 3 лет назад

The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.

oracle-oval
почти 12 лет назад

ELSA-2013-2537: unbreakable enterprise kernel security update (MODERATE)

EPSS

Процентиль: 24%
0.00078
Низкий