CVE-2011-1171

Priority
Description
net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux
kernel before 2.6.39 does not place the expected '\0' character at the end
of string data in the values of certain structure members, which allows
local users to obtain potentially sensitive information from kernel memory
by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and
then reading the argument to the resulting modprobe process.
Ubuntu-Description
Vasiliy Kulikov discovered that the netfilter code did not check certain
strings copied from userspace. A local attacker with netfilter access could
exploit this to read kernel memory or crash the system, leading to a denial
of service.
Notes
Package
Upstream:released (2.6.39~rc1)
Package
Upstream:released (2.6.39~rc1)
Package
Upstream:released (2.6.39~rc1)
Package
Upstream:released (2.6.39~rc1)
Package
Upstream:released (2.6.39~rc1)
Package
Upstream:released (2.6.39~rc1)
More Information

Updated: 2019-12-05 20:56:50 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)