The (1) key_notify_sa_flush and (2) key_notify_policy_flush functions in net/key/af_key.c in the Linux kernel before 3.10 do not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify interface of an IPSec key_socket.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-2234 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2 may address this issue. This issue has been addressed for Red Hat Enterprise Linux 5 via RHSA-2013:1166 (https://rhn.redhat.com/errata/RHSA-2013-1166.html).
Base Score | 1.7 |
---|---|
Base Metrics | AV:L/AC:L/Au:S/C:P/I:N/A:N |
Access Vector | Local |
Access Complexity | Low |
Authentication | Single |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (kernel) | RHSA-2013:1645 | 2013-11-20 |
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) | RHSA-2013:1264 | 2013-09-16 |
Red Hat Enterprise Linux 5 (kernel) | RHSA-2013:1166 | 2013-08-20 |