*** This bug is a security vulnerability *** Public security bug reported:
net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process. ** Affects: linux-fsl-imx51 (Ubuntu) Importance: Undecided Status: New ** Affects: linux-ti-omap4 (Ubuntu) Importance: Undecided Status: New ** Tags: kernel-cve-tracker ** Visibility changed to: Public ** Also affects: linux-ti-omap4 (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/801480 Title: CVE-2011-1170 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-fsl-imx51/+bug/801480/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs