CVE-2015-2041

Published: 23 February 2015

net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.

From the Ubuntu security team

An information leak was discovered in the Linux Kernel's handling of userspace configuration of the link layer control (LLC). A local user could exploit this flaw to read data from other sysctl settings.

Priority

Low

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
Patches:
Introduced by 590232a7150674b2036291eaefce085f3f9659c8
Fixed by 6b8d9117ccb4f81b1244aafa7bc70ef8fa45fc49
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (3.19~rc7)

Notes

AuthorNote
jdstrand
android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.10 and earlier preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support
sbeattie
introduced in https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=590232a7150674b2036291eaefce085f3f9659c8

References

Bugs