CVE-2010-4565

The bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel 2.6.36 and earlier creates a publicly accessible file with a filename containing a kernel memory address, which allows local users to obtain potentially sensitive information about kernel memory use by listing this filename.
References
Link Resource
http://openwall.com/lists/oss-security/2010/11/03/3 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2010/11/04/4 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2010/12/20/2 Mailing List Third Party Advisory
http://openwall.com/lists/oss-security/2010/12/21/1 Mailing List Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029 Third Party Advisory
http://www.securityfocus.com/bid/44661 Third Party Advisory VDB Entry
http://www.spinics.net/lists/netdev/msg145791.html Exploit Mailing List Third Party Advisory
http://www.spinics.net/lists/netdev/msg145796.html Mailing List Third Party Advisory
http://www.spinics.net/lists/netdev/msg146270.html Mailing List Patch Third Party Advisory
http://www.spinics.net/lists/netdev/msg146468.html Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=664544 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2010-12-29 18:00

Updated : 2024-02-04 17:54


NVD link : CVE-2010-4565

Mitre link : CVE-2010-4565

CVE.ORG link : CVE-2010-4565


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor