Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 493012 (CVE-2013-6405)

Summary: Kernel: net: leakage of uninitialized memory to user-space via recv syscalls (CVE-2013-6405)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: KernelAssignee: Gentoo Kernel Security <security-kernel>
Status: RESOLVED FIXED    
Severity: normal CC: kernel
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=1035875
Whiteboard: [linux < 3.13_rc1]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2013-12-01 09:13:50 UTC
From ${URL} :

Linux kernel built with the networking support(CONFIG_NET), is vulnerable to a
memory leakage flaw. It occurs while doing the recvmsg(2), recvfrom(2),
recvmmsg(2) socket calls.

A user/program could use this flaw to leak kernel memory bytes.

Upstream fix:
-------------
 -> 
https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=bceaa90240b6019ed73b49965eac7d167610be69

 -> 
https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=85fbaa75037d0b6b786ff18658ddf0b4014ce2a4
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-25 16:44:11 UTC
Fixes in 3.12.4