Vulnerability Description
The l2tp_ip6_getname function in net/l2tp/l2tp_ip6.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 3.5.7 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://www.openwall.com/lists/oss-security/2013/03/05/13
- https://github.com/torvalds/linux/commit/04d4fbca1017c11381e7d82acea21dd741e748b
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2Patch
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://www.openwall.com/lists/oss-security/2013/03/05/13
- https://github.com/torvalds/linux/commit/04d4fbca1017c11381e7d82acea21dd741e748b
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2Patch
FAQ
What is CVE-2012-6543?
CVE-2012-6543 is a vulnerability with a CVSS score of 1.9 (LOW). The l2tp_ip6_getname function in net/l2tp/l2tp_ip6.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel...
How severe is CVE-2012-6543?
CVE-2012-6543 has been rated LOW with a CVSS base score of 1.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-6543?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.