Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-7271

Опубликовано: 06 янв. 2014
Источник: debian
EPSS Низкий

Описание

The x25_recvmsg function in net/x25/af_x25.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6removedpackage
linux-2.6no-dsasqueezepackage
linuxfixed3.12.6-1package
linuxfixed3.2.54-1wheezypackage

Примечания

  • upstream fix: https://git.kernel.org/linus/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c

  • included in https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4

EPSS

Процентиль: 15%
0.00048
Низкий

Связанные уязвимости

ubuntu
около 12 лет назад

The x25_recvmsg function in net/x25/af_x25.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.

redhat
около 12 лет назад

The x25_recvmsg function in net/x25/af_x25.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.

nvd
около 12 лет назад

The x25_recvmsg function in net/x25/af_x25.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.

github
больше 3 лет назад

The x25_recvmsg function in net/x25/af_x25.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.

suse-cvrf
почти 14 лет назад

Security update for Kernel

EPSS

Процентиль: 15%
0.00048
Низкий