mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-28 09:12:00 +00:00
112 lines
4.4 KiB
JSON
112 lines
4.4 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"ID": "CVE-2011-1170",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "8282",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/8282"
|
|
},
|
|
{
|
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=689321",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689321"
|
|
},
|
|
{
|
|
"name": "[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks",
|
|
"refsource": "MLIST",
|
|
"url": "http://www.openwall.com/lists/oss-security/2011/03/18/15"
|
|
},
|
|
{
|
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=42eab94fff18cb1091d3501cd284d6bd6cc9c143",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=42eab94fff18cb1091d3501cd284d6bd6cc9c143"
|
|
},
|
|
{
|
|
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
|
|
},
|
|
{
|
|
"name": "RHSA-2011:0833",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
|
|
},
|
|
{
|
|
"name": "[netfilter-devel] 20110310 [PATCH] ipv4: netfilter: arp_tables: fix infoleak to userspace",
|
|
"refsource": "MLIST",
|
|
"url": "http://marc.info/?l=netfilter-devel&m=129978081009955&w=2"
|
|
},
|
|
{
|
|
"name": "http://downloads.avaya.com/css/P8/documents/100145416",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://downloads.avaya.com/css/P8/documents/100145416"
|
|
},
|
|
{
|
|
"name": "[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks",
|
|
"refsource": "MLIST",
|
|
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/4"
|
|
},
|
|
{
|
|
"name": "8278",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/8278"
|
|
},
|
|
{
|
|
"name": "[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks",
|
|
"refsource": "MLIST",
|
|
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/1"
|
|
}
|
|
]
|
|
}
|
|
} |