Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-7265

Опубликовано: 18 нояб. 2013
Источник: redhat
CVSS2: 2.1

Описание

The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.

Отчет

This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelAffected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2014:015911.02.2014
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2014:043928.04.2014

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1035875Kernel: net: leakage of uninitialized memory to user-space via recv syscalls

2.1 Low

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.

nvd
больше 11 лет назад

The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.

debian
больше 11 лет назад

The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel b ...

github
около 3 лет назад

The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.

fstec
почти 11 лет назад

Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к конфиденциальной информации из памяти ядра

2.1 Low

CVSS2