The report API in the crypto user configuration API in the Linux kernel through 3.8.2 uses an incorrect C library function for copying strings, which allows local users to obtain sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability.
Metrics
No CVSS v4.0
No CVSS v3.1
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
AV:L/AC:L/Au:N/C:P/I:N/A:N
This CVE is not in the KEV list.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
Vendors | Products |
---|---|
Linux |
|
Redhat |
|
Configuration 1 [-]
|
Configuration 2 [-]
|
Package | CPE | Advisory | Released Date |
---|---|---|---|
Red Hat Enterprise MRG 2 | |||
kernel-rt-0:3.6.11.2-rt33.39.el6rt | cpe:/a:redhat:enterprise_mrg:2:server:el6 | RHSA-2013:0829 | 2013-05-20T00:00:00Z |
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2013-03-14T20:00:00
Updated: 2024-08-06T15:44:32.334Z
Reserved: 2013-03-08T00:00:00
Link: CVE-2013-2546
Vulnrichment
No data.
NVD
Status : Modified
Published: 2013-03-15T20:55:08.600
Modified: 2024-11-21T01:51:54.497
Link: CVE-2013-2546
Redhat