Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 462766 (CVE-2013-2635)

Summary: Kernel : Information leak in the RTNETLINK component (CVE-2013-2635)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: KernelAssignee: Gentoo Kernel Security <security-kernel>
Status: RESOLVED FIXED    
Severity: normal CC: kernel
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=924690
Whiteboard: [<3.8.4]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2013-03-23 11:06:55 UTC
From $URL :

Common Vulnerabilities and Exposures assigned an identifier CVE-2013-2635 to the following 
vulnerability:

The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel before 3.8.4 does not 
initialize a certain structure member, which allows local users to obtain sensitive information 
from kernel stack memory via a crafted application.

References:
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2635
[2] http://www.openwall.com/lists/oss-security/2013/03/20/1
[3] 
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=84d73cd3fb142bf1298a8c13fd4ca50fd2432372
[4] http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4
[5] https://bugzilla.redhat.com/show_bug.cgi?id=923652
[6] https://github.com/torvalds/linux/commit/84d73cd3fb142bf1298a8c13fd4ca50fd2432372
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-10-25 00:30:43 UTC
Patch in mainline 3.9 onwards