CVE-2010-3876 (retired)

Priority
Description
net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not
properly initialize certain structure members, which allows local users to
obtain potentially sensitive information from kernel stack memory by
leveraging the CAP_NET_RAW capability to read copies of the applicable
structures.
Ubuntu-Description
Vasiliy Kulikov discovered that the Linux kernel sockets implementation did
not properly initialize certain structures. A local attacker could exploit
this to read kernel stack memory, leading to a loss of privacy.
Assigned-to
apw
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
More Information

Updated: 2019-08-23 08:41:21 UTC (commit 436fd4ed4cf0038ddd382cb8649607ace163dda7)