CVE-2010-3876
Bug #711045 reported by
Andy Whitcroft
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
Low
|
Andy Whitcroft | ||
Dapper |
Won't Fix
|
Low
|
Andy Whitcroft | ||
Hardy |
Won't Fix
|
Low
|
Andy Whitcroft | ||
Karmic |
Won't Fix
|
Low
|
Andy Whitcroft | ||
Lucid |
Fix Released
|
Low
|
Andy Whitcroft | ||
Maverick |
Won't Fix
|
Low
|
Andy Whitcroft | ||
Natty |
Fix Released
|
Low
|
Andy Whitcroft | ||
linux-fsl-imx51 (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Dapper |
Invalid
|
Undecided
|
Unassigned | ||
Hardy |
Invalid
|
Undecided
|
Unassigned | ||
Karmic |
Won't Fix
|
Undecided
|
Unassigned | ||
Lucid |
Fix Released
|
Undecided
|
Paolo Pisati | ||
Maverick |
Invalid
|
Undecided
|
Unassigned | ||
Natty |
Invalid
|
Undecided
|
Unassigned | ||
linux-mvl-dove (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Dapper |
Invalid
|
Undecided
|
Unassigned | ||
Hardy |
Invalid
|
Undecided
|
Unassigned | ||
Karmic |
Invalid
|
Undecided
|
Unassigned | ||
Lucid |
Fix Released
|
Undecided
|
Unassigned | ||
Maverick |
Fix Released
|
Undecided
|
Unassigned | ||
Natty |
Invalid
|
Undecided
|
Unassigned |
Bug Description
net/packet/
properly initialize certain structure members, which allows local users to
obtain potentially sensitive information from kernel stack memory by
leveraging the CAP_NET_RAW capability to read copies of the applicable
structures.
CVE References
- 2010-0435
- 2010-2942
- 2010-2943
- 2010-2954
- 2010-2955
- 2010-2960
- 2010-2962
- 2010-2963
- 2010-3067
- 2010-3078
- 2010-3080
- 2010-3084
- 2010-3310
- 2010-3432
- 2010-3437
- 2010-3442
- 2010-3477
- 2010-3705
- 2010-3848
- 2010-3849
- 2010-3850
- 2010-3861
- 2010-3865
- 2010-3875
- 2010-3876
- 2010-3877
- 2010-3880
- 2010-3904
- 2010-4072
- 2010-4073
- 2010-4076
- 2010-4077
- 2010-4158
- 2010-4163
- 2010-4164
- 2010-4165
- 2010-4169
- 2010-4175
- 2010-4258
- 2010-4342
- 2010-4346
- 2010-4527
- 2010-4529
- 2010-4565
- 2010-4656
- 2011-0463
- 2011-0521
- 2011-0695
- 2011-0711
- 2011-0712
- 2011-1017
visibility: | private → public |
Changed in linux (Ubuntu Hardy): | |
importance: | Undecided → Low |
Changed in linux (Ubuntu Karmic): | |
importance: | Undecided → Low |
Changed in linux (Ubuntu Maverick): | |
importance: | Undecided → Low |
Changed in linux (Ubuntu Lucid): | |
importance: | Undecided → Low |
Changed in linux (Ubuntu Natty): | |
importance: | Undecided → Low |
Changed in linux (Ubuntu Dapper): | |
importance: | Undecided → Low |
Changed in linux (Ubuntu Dapper): | |
status: | In Progress → Fix Committed |
Changed in linux (Ubuntu Lucid): | |
status: | In Progress → Fix Committed |
Changed in linux (Ubuntu Hardy): | |
status: | In Progress → Fix Committed |
Changed in linux (Ubuntu Maverick): | |
status: | In Progress → Fix Committed |
Changed in linux (Ubuntu Karmic): | |
status: | In Progress → Fix Committed |
Changed in linux-mvl-dove (Ubuntu Karmic): | |
status: | New → Invalid |
Changed in linux-mvl-dove (Ubuntu Maverick): | |
status: | New → Fix Released |
tags: |
added: kernel-cve-tracking-bug removed: kernel-cve-tracker |
Changed in linux (Ubuntu Dapper): | |
status: | Fix Committed → Won't Fix |
Changed in linux (Ubuntu Hardy): | |
status: | Fix Committed → Won't Fix |
Changed in linux (Ubuntu Maverick): | |
status: | Fix Committed → Won't Fix |
To post a comment you must log in.
This was fixed by the commit below, this is already upstream and released in v2.6.37, therefore closing off for Natty:
commit 67286640f638f5a d41a946b9a3dc75 327950248f
Author: Vasiliy Kulikov <email address hidden>
Date: Wed Nov 10 12:09:10 2010 -0800
net: packet: fix information leak to userland
packet_ getname_ spkt() doesn't initialize all members of sa_data field of
sockaddr struct if strlen(dev->name) < 13. This structure is then copied
to userland. It leads to leaking of contents of kernel stack memory.
We have to fully fill sa_data with strncpy() instead of strlcpy().
The same with packet_getname(): it doesn't initialize sll_pkttype field of
sockaddr_ll. Set it to zero.
Signed-off-by: Vasiliy Kulikov <email address hidden>
Signed-off-by: David S. Miller <email address hidden>