CVE-2013-3076

The crypto API in the Linux kernel through 3.9-rc8 does not initialize certain length variables, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call, related to the hash_recvmsg function in crypto/algif_hash.c and the skcipher_recvmsg function in crypto/algif_skcipher.c.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*

History

No history.

Information

Published : 2013-04-22 11:40

Updated : 2024-02-04 18:16


NVD link : CVE-2013-3076

Mitre link : CVE-2013-3076

CVE.ORG link : CVE-2013-3076


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor