CVE-2011-1171

Priority
Description
net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux
kernel before 2.6.39 does not place the expected '\0' character at the end
of string data in the values of certain structure members, which allows
local users to obtain potentially sensitive information from kernel memory
by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and
then reading the argument to the resulting modprobe process.
Ubuntu-Description
Vasiliy Kulikov discovered that the netfilter code did not check certain
strings copied from userspace. A local attacker with netfilter access could
exploit this to read kernel memory or crash the system, leading to a denial
of service.
Package
Upstream:released (2.6.39~rc1)
Package
Upstream:released (2.6.39~rc1)
Package
Upstream:released (2.6.39~rc1)
Package
Upstream:released (2.6.39~rc1)
Package
Upstream:released (2.6.39~rc1)
Package
Upstream:released (2.6.39~rc1)
More Information

Updated: 2019-01-14 21:56:45 UTC (commit 51f9b73af244ba86b9321e46e526586c25a8e060)