CVE-2011-1172
Publication date 22 June 2011
Last updated 24 July 2024
Ubuntu priority
net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
From the Ubuntu Security Team
Vasiliy Kulikov discovered that the netfilter code did not check certain strings copied from userspace. A local attacker with netfilter access could exploit this to read kernel memory or crash the system, leading to a denial of service.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-lts-backport-natty | ||
linux-mvl-dove | ||
linux-ti-omap4 | ||
Patch details
Package | Patch details |
---|---|
linux |
References
Related Ubuntu Security Notices (USN)
- USN-1202-1
- Linux kernel (OMAP4) vulnerabilities
- 13 September 2011
- USN-1160-1
- Linux kernel vulnerabilities
- 28 June 2011
- USN-1186-1
- Linux kernel vulnerabilities
- 9 August 2011
- USN-1141-1
- Linux kernel vulnerabilities
- 1 June 2011
- USN-1162-1
- Linux kernel vulnerabilities (Marvell Dove)
- 29 June 2011
- USN-1204-1
- Linux kernel (i.MX51) vulnerabilities
- 13 September 2011
- USN-1167-1
- Linux kernel vulnerabilities
- 13 July 2011
- USN-1187-1
- Linux kernel (Maverick backport) vulnerabilities
- 9 August 2011
- USN-1212-1
- Linux kernel (OMAP4) vulnerabilities
- 21 September 2011
- USN-1159-1
- Linux kernel vulnerabilities (Marvell Dove)
- 13 July 2011