*** This bug is a security vulnerability ***

Public security bug reported:

net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux
kernel before 2.6.39 does not place the expected '\0' character at the end
of string data in the values of certain structure members, which allows
local users to obtain potentially sensitive information from kernel memory
by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and
then reading the argument to the resulting modprobe process.

** Affects: linux-fsl-imx51 (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: linux-ti-omap4 (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: kernel-cve-tracker

** Visibility changed to: Public

** Also affects: linux-ti-omap4 (Ubuntu)
   Importance: Undecided
       Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/801480

Title:
  CVE-2011-1170

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-fsl-imx51/+bug/801480/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to