CVE-2011-1173

The econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.39 on the x86_64 platform allows remote attackers to obtain potentially sensitive information from kernel stack memory by reading uninitialized data in the ah field of an Acorn Universal Networking (AUN) packet.
References
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:25

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67c5c6cb8129c595f21e88254a3fc6b3b841ae8e - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67c5c6cb8129c595f21e88254a3fc6b3b841ae8e -
References () http://marc.info/?l=linux-netdev&m=130036203528021&w=2 - Patch, Third Party Advisory () http://marc.info/?l=linux-netdev&m=130036203528021&w=2 - Patch, Third Party Advisory
References () http://securityreason.com/securityalert/8279 - Third Party Advisory () http://securityreason.com/securityalert/8279 - Third Party Advisory
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39 - Release Notes, Vendor Advisory () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39 - Release Notes, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2011/03/18/15 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2011/03/18/15 - Mailing List, Patch, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2011/03/21/1 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2011/03/21/1 - Mailing List, Patch, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2011/03/21/4 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2011/03/21/4 - Mailing List, Patch, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=591815#c14 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=591815#c14 - Issue Tracking, Third Party Advisory

Information

Published : 2011-06-22 22:55

Updated : 2024-11-21 01:25


NVD link : CVE-2011-1173

Mitre link : CVE-2011-1173

CVE.ORG link : CVE-2011-1173


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor