2.1
CVSSv2

CVE-2013-2148

Published: 07/06/2013 Updated: 13/02/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 188
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The fill_event_metadata function in fs/notify/fanotify/fanotify_user.c in the Linux kernel up to and including 3.9.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a read operation on the fanotify descriptor.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 3.9.0

linux linux kernel 3.9.2

linux linux kernel 3.9

linux linux kernel 3.9.3

linux linux kernel

linux linux kernel 3.9.1

Vendor Advisories

Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel-rt packages that fix several security issues and multiplebugs are now available for Red Hat Enterprise MRG 23The Red Hat Security Response Team has rated this update as havingimportant ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, information leak or privilege escalation The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2013-1059 Chanam Park reported an issue in the Ceph distributed storage system Remote users can cause a den ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
The system could be made to expose sensitive information ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...