First published: Thu Jun 06 2013(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=3.9.4 | |
Linux Kernel | =3.9-rc1 | |
Linux Kernel | =3.9-rc2 | |
Linux Kernel | =3.9-rc3 | |
Linux Kernel | =3.9-rc4 | |
Linux Kernel | =3.9-rc5 | |
Linux Kernel | =3.9-rc6 | |
Linux Kernel | =3.9-rc7 | |
Linux Kernel | =3.9.0 | |
Linux Kernel | =3.9.1 | |
Linux Kernel | =3.9.2 | |
Linux Kernel | =3.9.3 | |
SUSE Linux Enterprise Server | =10-sp4 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2147 is considered to have a moderate severity due to its information leakage vulnerability.
To mitigate CVE-2013-2147, upgrade the Linux Kernel to versions 5.10.223-1, 5.10.226-1, 6.1.123-1, or newer.
CVE-2013-2147 affects Linux Kernel versions up to and including 3.9.4 and specific configurations of SUSE Linux Enterprise Server.
CVE-2013-2147 is an information leakage flaw that can occur during ioctl(2) calls on specific block devices.
As of now, there are no known active exploits for CVE-2013-2147, but it is recommended to apply patches to avoid potential risks.