CVE-2013-3076

MEDIUM

Description

The crypto API in the Linux kernel through 3.9-rc8 does not initialize certain length variables, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call, related to the hash_recvmsg function in crypto/algif_hash.c and the skcipher_recvmsg function in crypto/algif_skcipher.c.

References

http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103750.html

http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104480.html

http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html

http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html

http://www.openwall.com/lists/oss-security/2013/04/14/3

http://www.ubuntu.com/usn/USN-1837-1

https://github.com/torvalds/linux/commit/72a763d805a48ac8c0bf48fdb510e84c12de51fe

Details

Source: MITRE

Published: 2013-04-22

Updated: 2017-11-29

Type: CWE-200

Risk Information

CVSS v2.0

Base Score: 4.9

Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N

Impact Score: 6.9

Exploitability Score: 3.9

Severity: MEDIUM