Revision Date: | 2013-04-22 | Version: | 1 | Title: | CVE-2013-3226 on Ubuntu 12.04 LTS (precise) - low. | Description: | The sco_sock_recvmsg function in net/bluetooth/sco.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. An information leak was discovered in the Linux kernel's bluetooth SCO sockets implementation. A local user could exploit this flaw to examine potentially sensitive information from the kernel's stack memory.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2013-3226
| Platform(s): | Ubuntu 12.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 12.04 LTS (precise) is installed. AND Package Information
NOT While related to the CVE in some way, the 'linux' package in precise is not affected.
OR NOT While related to the CVE in some way, the 'linux-armadaxp' package in precise is not affected.
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
OR NOT While related to the CVE in some way, the 'linux-lts-quantal' package in precise is not affected.
OR The 'linux-lts-raring' package in precise was vulnerable but has been fixed (note: '3.8.0-22.33~precise1').
OR NOT While related to the CVE in some way, the 'linux-lts-trusty' package in precise is not affected (note: '3.13.0-24.46~precise1').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
OR NOT While related to the CVE in some way, the 'linux-ti-omap4' package in precise is not affected.
|
|