First published: Mon Dec 20 2010(Updated: )
Description of problem: In bcm_connect() (in net/can/bcm.c), there is the following code: sprintf(bo->procname, "%p", sock); The CAN protocol uses the address of a kernel heap object sock as a proc filename, revealing information that could be useful during exploitation. Reference: <a href="http://seclists.org/oss-sec/2010/q4/103">http://seclists.org/oss-sec/2010/q4/103</a> <a href="http://www.spinics.net/lists/netdev/msg145791.html">http://www.spinics.net/lists/netdev/msg145791.html</a> Acknowledgements: Red Hat would like to thank Dan Rosenberg for reporting this issue.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=2.6.36 | |
debian/linux-2.6 | ||
debian/user-mode-linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.