The bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel 2.6.36 and earlier creates a publicly accessible file with a filename containing a kernel memory address, which allows local users to obtain potentially sensitive information about kernel memory use by listing this filename.
References
Link | Resource |
---|---|
http://openwall.com/lists/oss-security/2010/11/03/3 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2010/11/04/4 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2010/12/20/2 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2010/12/21/1 | Mailing List Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029 | Third Party Advisory |
http://www.securityfocus.com/bid/44661 | Third Party Advisory VDB Entry |
http://www.spinics.net/lists/netdev/msg145791.html | Exploit Mailing List Third Party Advisory |
http://www.spinics.net/lists/netdev/msg145796.html | Mailing List Third Party Advisory |
http://www.spinics.net/lists/netdev/msg146270.html | Mailing List Patch Third Party Advisory |
http://www.spinics.net/lists/netdev/msg146468.html | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=664544 | Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2010-12-29 18:00
Updated : 2024-02-04 17:54
NVD link : CVE-2010-4565
Mitre link : CVE-2010-4565
CVE.ORG link : CVE-2010-4565
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor