First published: Mon Apr 22 2013(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=3.9 | |
Linux Kernel | =3.9-rc1 | |
Linux Kernel | =3.9-rc2 | |
Linux Kernel | =3.9-rc3 | |
Linux Kernel | =3.9-rc4 | |
Linux Kernel | =3.9-rc5 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3222 is considered to have a moderate severity level due to potential local information disclosure.
To fix CVE-2013-3222, upgrade your Linux kernel to version 3.9-rc7 or later.
CVE-2013-3222 affects Linux kernel versions prior to 3.9-rc7, specifically from 3.9-rc1 up to 3.9-rc6.
CVE-2013-3222 allows local users to gain access to sensitive information from kernel stack memory.
You can determine if your system is vulnerable by checking the version of the Linux kernel installed and comparing it to the affected versions of CVE-2013-3222.