You are here

CVE-2013-2237

Vincent (CVE) Danen's picture
The key_notify_policy_flush function in net/key/af_key.c in the Linux kernel before 3.9 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify_policy interface of an IPSec key_socket.

Details Source

Mitre

Statement

This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise MRG 2 may address this issue. This issue has been addressed for Red Hat Enterprise Linux 5 via the advisory RHSA-2013:1166 and Red Hat Enterprise Linux 6 via the advisory RHSA-2013:1173.

Public Date

2013-02-18 00:00:00

Impact

Low

Bugzilla

CVE-2013-2237 Kernel: net: af_key: initialize satype in key_notify_policy_flush

Bugzilla ID

981 220

CVSS Status

verified

Base Score

1.70

Base Metrics

AV:L/AC:L/Au:S/C:P/I:N/A:N

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (kernel) RHSA-2013:1173 2013-08-27
Red Hat Enterprise Linux OpenStack Platform 3.0 (kernel) RHSA-2013:1195 2013-09-03
MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2013:1264 2013-09-16
Red Hat Enterprise Linux 5 (kernel) RHSA-2013:1166 2013-08-20

Affected Packages State

Platform Package State
Red Hat Enterprise MRG 2 realtime-kernel Affected