CVE-2010-3876
Bug #711045 reported by
Andy Whitcroft
This bug affects 1 person
| Affects | Status | Importance | Assigned to | Milestone | |
|---|---|---|---|---|---|
| linux (Ubuntu) |
Fix Released
|
Low
|
Andy Whitcroft | ||
| Dapper |
Won't Fix
|
Low
|
Andy Whitcroft | ||
| Hardy |
Won't Fix
|
Low
|
Andy Whitcroft | ||
| Karmic |
Won't Fix
|
Low
|
Andy Whitcroft | ||
| Lucid |
Fix Released
|
Low
|
Andy Whitcroft | ||
| Maverick |
Won't Fix
|
Low
|
Andy Whitcroft | ||
| Natty |
Fix Released
|
Low
|
Andy Whitcroft | ||
| linux-fsl-imx51 (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
| Dapper |
Invalid
|
Undecided
|
Unassigned | ||
| Hardy |
Invalid
|
Undecided
|
Unassigned | ||
| Karmic |
Won't Fix
|
Undecided
|
Unassigned | ||
| Lucid |
Fix Released
|
Undecided
|
Paolo Pisati | ||
| Maverick |
Invalid
|
Undecided
|
Unassigned | ||
| Natty |
Invalid
|
Undecided
|
Unassigned | ||
| linux-mvl-dove (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
| Dapper |
Invalid
|
Undecided
|
Unassigned | ||
| Hardy |
Invalid
|
Undecided
|
Unassigned | ||
| Karmic |
Invalid
|
Undecided
|
Unassigned | ||
| Lucid |
Fix Released
|
Undecided
|
Unassigned | ||
| Maverick |
Fix Released
|
Undecided
|
Unassigned | ||
| Natty |
Invalid
|
Undecided
|
Unassigned | ||
Bug Description
net/packet/
properly initialize certain structure members, which allows local users to
obtain potentially sensitive information from kernel stack memory by
leveraging the CAP_NET_RAW capability to read copies of the applicable
structures.
CVE References
- 2010-0435
- 2010-2942
- 2010-2943
- 2010-2954
- 2010-2955
- 2010-2960
- 2010-2962
- 2010-2963
- 2010-3067
- 2010-3078
- 2010-3080
- 2010-3084
- 2010-3310
- 2010-3432
- 2010-3437
- 2010-3442
- 2010-3477
- 2010-3705
- 2010-3848
- 2010-3849
- 2010-3850
- 2010-3861
- 2010-3865
- 2010-3875
- 2010-3876
- 2010-3877
- 2010-3880
- 2010-3904
- 2010-4072
- 2010-4073
- 2010-4076
- 2010-4077
- 2010-4158
- 2010-4163
- 2010-4164
- 2010-4165
- 2010-4169
- 2010-4175
- 2010-4258
- 2010-4342
- 2010-4346
- 2010-4527
- 2010-4529
- 2010-4565
- 2010-4656
- 2011-0463
- 2011-0521
- 2011-0695
- 2011-0711
- 2011-0712
- 2011-1017
| visibility: | private → public |
| Changed in linux (Ubuntu Hardy): | |
| importance: | Undecided → Low |
| Changed in linux (Ubuntu Karmic): | |
| importance: | Undecided → Low |
| Changed in linux (Ubuntu Maverick): | |
| importance: | Undecided → Low |
| Changed in linux (Ubuntu Lucid): | |
| importance: | Undecided → Low |
| Changed in linux (Ubuntu Natty): | |
| importance: | Undecided → Low |
| Changed in linux (Ubuntu Dapper): | |
| importance: | Undecided → Low |
| Changed in linux (Ubuntu Dapper): | |
| status: | In Progress → Fix Committed |
| Changed in linux (Ubuntu Lucid): | |
| status: | In Progress → Fix Committed |
| Changed in linux (Ubuntu Hardy): | |
| status: | In Progress → Fix Committed |
| Changed in linux (Ubuntu Maverick): | |
| status: | In Progress → Fix Committed |
| Changed in linux (Ubuntu Karmic): | |
| status: | In Progress → Fix Committed |
| Changed in linux-mvl-dove (Ubuntu Karmic): | |
| status: | New → Invalid |
| Changed in linux-mvl-dove (Ubuntu Maverick): | |
| status: | New → Fix Released |
| tags: |
added: kernel-cve-tracking-bug removed: kernel-cve-tracker |
| Changed in linux (Ubuntu Dapper): | |
| status: | Fix Committed → Won't Fix |
| Changed in linux (Ubuntu Hardy): | |
| status: | Fix Committed → Won't Fix |
| Changed in linux (Ubuntu Maverick): | |
| status: | Fix Committed → Won't Fix |
To post a comment you must log in.

This was fixed by the commit below, this is already upstream and released in v2.6.37, therefore closing off for Natty:
commit 67286640f638f5a d41a946b9a3dc75 327950248f
Author: Vasiliy Kulikov <email address hidden>
Date: Wed Nov 10 12:09:10 2010 -0800
net: packet: fix information leak to userland
packet_ getname_ spkt() doesn't initialize all members of sa_data field of
sockaddr struct if strlen(dev->name) < 13. This structure is then copied
to userland. It leads to leaking of contents of kernel stack memory.
We have to fully fill sa_data with strncpy() instead of strlcpy().
The same with packet_getname(): it doesn't initialize sll_pkttype field of
sockaddr_ll. Set it to zero.
Signed-off-by: Vasiliy Kulikov <email address hidden>
Signed-off-by: David S. Miller <email address hidden>