Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2012-6543

Published: 15 March 2013

The l2tp_ip6_getname function in net/l2tp/l2tp_ip6.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

From the Ubuntu Security Team

Mathias Krause discovered an information leak in the Linux kernel's implementation of getsockname for Layer Two Tunneling Protocol (L2TP). A local user could exploit this flaw to examine some of the kernel's stack memory.

Priority

Low

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
hardy Not vulnerable

lucid Not vulnerable

oneiric Not vulnerable

precise Not vulnerable

quantal Not vulnerable
(3.5.0-17.26)
raring Not vulnerable
(3.7.0-0.1)
upstream
Released (3.6~rc3)
Patches:
Introduced by

a32e0eec7042b21ccb52896cf715e3e2641fed93

Fixed by 04d4fbca1017c11381e7d82acea21dd741e748bc
linux-armadaxp
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

oneiric Does not exist

precise Not vulnerable

quantal Not vulnerable
(3.5.0-1603.5)
raring Does not exist

upstream
Released (3.6~rc3)
This package is not directly supported by the Ubuntu Security Team
linux-ec2
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Not vulnerable

oneiric Does not exist

precise Does not exist

quantal Does not exist

raring Does not exist

upstream
Released (3.6~rc3)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Ignored
(end of life)
oneiric Does not exist

precise Does not exist

quantal Does not exist

raring Does not exist

upstream
Released (3.6~rc3)
linux-linaro-omap
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

oneiric Ignored
(end of life)
precise Ignored
(end of life)
quantal Ignored
(end of life)
raring Does not exist

upstream
Released (3.6~rc3)
linux-linaro-shared
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

oneiric Ignored
(end of life)
precise Ignored
(end of life)
quantal Ignored
(end of life)
raring Does not exist

upstream
Released (3.6~rc3)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

oneiric Ignored
(end of life)
precise Ignored
(end of life)
quantal Ignored
(end of life)
raring Does not exist

upstream
Released (3.6~rc3)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Ignored
(end of life)
oneiric Does not exist

precise Does not exist

quantal Does not exist

raring Does not exist

upstream
Released (3.6~rc3)
linux-lts-backport-oneiric
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Not vulnerable

oneiric Does not exist

precise Does not exist

quantal Does not exist

raring Does not exist

upstream
Released (3.6~rc3)
linux-lts-quantal
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

oneiric Does not exist

precise Not vulnerable
(3.5.0-18.29~precise1)
quantal Does not exist

raring Does not exist

upstream
Released (3.6~rc3)
linux-lts-raring
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

oneiric Does not exist

precise Not vulnerable

quantal Does not exist

raring Does not exist

upstream
Released (3.6~rc3)
linux-mvl-dove
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Ignored
(end of life)
oneiric Does not exist

precise Does not exist

quantal Does not exist

raring Does not exist

upstream
Released (3.6~rc3)
linux-qcm-msm
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Ignored
(end of life)
oneiric Ignored
(end of life)
precise Ignored
(end of life)
quantal Ignored
(end of life)
raring Does not exist

upstream
Released (3.6~rc3)
linux-ti-omap4
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

oneiric Not vulnerable

precise Not vulnerable

quantal Not vulnerable
(3.5.0-213.20)
raring Not vulnerable
(3.5.0-213.20)
upstream
Released (3.6~rc3)