Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-3222

Опубликовано: 07 апр. 2013
Источник: redhat
CVSS2: 2.1
EPSS Низкий

Описание

The vcc_recvmsg function in net/atm/common.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.

Отчет

This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2 may address this issue.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=955216Kernel: atm: update msg_namelen in vcc_recvmsg()

EPSS

Процентиль: 24%
0.00078
Низкий

2.1 Low

CVSS2

Связанные уязвимости

ubuntu
больше 12 лет назад

The vcc_recvmsg function in net/atm/common.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.

nvd
больше 12 лет назад

The vcc_recvmsg function in net/atm/common.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.

debian
больше 12 лет назад

The vcc_recvmsg function in net/atm/common.c in the Linux kernel befor ...

github
около 3 лет назад

The vcc_recvmsg function in net/atm/common.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.

oracle-oval
около 12 лет назад

ELSA-2013-2537: unbreakable enterprise kernel security update (MODERATE)

EPSS

Процентиль: 24%
0.00078
Низкий

2.1 Low

CVSS2