{
  "threat_severity" : "Low",
  "public_date" : "2012-10-25T00:00:00Z",
  "bugzilla" : {
    "description" : "Kernel: information leak in fs/compat_ioctl.c VIDEO_SET_SPU_PALETTE",
    "id" : "949567",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=949567"
  },
  "cvss" : {
    "cvss_base_score" : "1.7",
    "cvss_scoring_vector" : "AV:L/AC:L/Au:S/C:P/I:N/A:N",
    "status" : "verified"
  },
  "details" : [ "The do_video_set_spu_palette function in fs/compat_ioctl.c in the Linux kernel before 3.6.5 on unspecified architectures lacks a certain error check, which might allow local users to obtain sensitive information from kernel stack memory via a crafted VIDEO_SET_SPU_PALETTE ioctl call on a /dev/dvb device." ],
  "statement" : "This issue does not affect the versions of the kernel package as shipped with\nRed Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\nThis issue affects the version of Linux kernel as shipped with\nRed Hat Enterprise Linux 6. Future kernel updates for Red Hat Enterprise Linux 6\nmay address this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2013-11-20T00:00:00Z",
    "advisory" : "RHSA-2013:1645",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "kernel-0:2.6.32-431.el6"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise MRG 2",
    "fix_state" : "Not affected",
    "package_name" : "realtime-kernel",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2013-1928\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-1928" ],
  "name" : "CVE-2013-1928",
  "csaw" : false
}