Red Hat Bugzilla – Bug 956145
CVE-2013-3235 Kernel: tipc: info leaks via msg_name in recv_msg/recv_stream
Last modified: 2015-07-31 03:05:11 EDT
Linux kernel built with the The Transparent Inter Process Communication (CONFIG_TIPC) protocol support is vulnerable to an information leakage flaw. It occurs while receiving messages via recvmsg(2) socket call. A user/program could use this flaw to leak kernel memory bytes. Upstream fix: ------------- -> http://git.kernel.org/linus/60085c3d009b0df252547adb336d1ccca5ce52ec Reference: ---------- -> www.openwall.com/lists/oss-security/2013/04/14/3
Statement: This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. This issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 5. Future kernel updates for Red Hat Enterprise Linux 5 may address this issue.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:1034 https://rhn.redhat.com/errata/RHSA-2013-1034.html