CVE-2010-3876 (retired)

Priority
Description
net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not
properly initialize certain structure members, which allows local users to
obtain potentially sensitive information from kernel stack memory by
leveraging the CAP_NET_RAW capability to read copies of the applicable
structures.
Ubuntu-Description
Vasiliy Kulikov discovered that the Linux kernel sockets implementation did
not properly initialize certain structures. A local attacker could exploit
this to read kernel stack memory, leading to a loss of privacy.
Assigned-to
apw
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
More Information

Updated: 2019-03-26 11:53:43 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)