Red Hat Customer Portal

Skip to main content

CVE-2010-3876

Impact:
Low
Public Date:
2010-10-31
IAVA:
2011-A-0147
Bugzilla:
649715: CVE-2010-3876 kernel: net/packet/af_packet.c: reading uninitialized stack memory

The MITRE CVE dictionary describes this issue as:

net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.

Find out more about CVE-2010-3876 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to
this product being in Extended Life Cycle Phase of its maintenance life-cycle,
where only qualified security errata of critical impact are addressed.

For further information about the Errata Support Policy, visit:
http://www.redhat.com/security/updates/errata

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 1.9
Base Metrics AV:L/AC:M/Au:N/C:P/I:N/A:N
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
MRG Grid for RHEL 5 Server (kernel-rt) RHSA-2010:0958 2010-12-08
Red Hat Enterprise Linux 6 (kernel) RHSA-2011:0007 2011-01-11
Red Hat Enterprise Linux 4 (kernel) RHSA-2011:0162 2011-01-18
Red Hat Enterprise Linux 5 (kernel) RHSA-2011:0004 2011-01-04

Acknowledgements

Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting this issue.

Last Modified