{
  "threat_severity" : "Low",
  "public_date" : "2013-04-07T00:00:00Z",
  "bugzilla" : {
    "description" : "Kernel: crypto: algif - suppress sending source address information in recvmsg",
    "id" : "956162",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=956162"
  },
  "cvss" : {
    "cvss_base_score" : "2.1",
    "cvss_scoring_vector" : "AV:L/AC:L/Au:N/C:P/I:N/A:N",
    "status" : "verified"
  },
  "details" : [ "The crypto API in the Linux kernel through 3.9-rc8 does not initialize certain length variables, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call, related to the hash_recvmsg function in crypto/algif_hash.c and the skcipher_recvmsg function in crypto/algif_skcipher.c." ],
  "statement" : "This issue does not affect the versions of Linux kernel as shipped with\nRed Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\nThis issue affects the version of the kernel package as shipped with\nRed Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise MRG 2\nmay address this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise MRG 2",
    "release_date" : "2013-05-20T00:00:00Z",
    "advisory" : "RHSA-2013:0829",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:2:server:el6",
    "package" : "kernel-rt-0:3.6.11.2-rt33.39.el6rt"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2013-3076\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-3076" ],
  "name" : "CVE-2013-3076",
  "csaw" : false
}