{
  "threat_severity" : "Low",
  "public_date" : "2012-08-15T00:00:00Z",
  "bugzilla" : {
    "description" : "Kernel: net/tun: ioctl() based information leaks",
    "id" : "922344",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=922344"
  },
  "cvss" : {
    "cvss_base_score" : "1.7",
    "cvss_scoring_vector" : "AV:L/AC:L/Au:S/C:P/I:N/A:N",
    "status" : "verified"
  },
  "details" : [ "The __tun_chr_ioctl function in drivers/net/tun.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application." ],
  "statement" : "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise MRG 2.\nThis issue did affect the version of the Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2013-04-16T00:00:00Z",
    "advisory" : "RHSA-2013:0747",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "kernel-0:2.6.18-348.4.1.el5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2013-04-23T00:00:00Z",
    "advisory" : "RHSA-2013:0744",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "kernel-0:2.6.32-358.6.1.el6"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise MRG 2",
    "fix_state" : "Not affected",
    "package_name" : "realtime-kernel",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2012-6547\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-6547" ],
  "name" : "CVE-2012-6547",
  "csaw" : false
}