The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-3224 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects the versions of the Linux kernel as shipped with
Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2. Future kernel
updates for Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2 may
address this issue.
Base Score | 1.9 |
---|---|
Base Metrics | AV:L/AC:M/Au:N/C:P/I:N/A:N |
Access Vector | Local |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (kernel) | RHSA-2013:1051 | 2013-07-16 |
Red Hat Enterprise Linux OpenStack Platform 3.0 (kernel) | RHSA-2013:1080 | 2013-07-16 |
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) | RHSA-2013:0829 | 2013-05-20 |
Red Hat Enterprise Linux 5 (kernel) | RHSA-2013:1034 | 2013-07-10 |