Bug 2068577 (CVE-2021-39636) - CVE-2021-39636 kernel: information disclosure due to uninitialized data in do_ipt_get_ctl() and do_ipt_set_ctl() in ip_tables.c
Summary: CVE-2021-39636 kernel: information disclosure due to uninitialized data in do...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2021-39636
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2068578
TreeView+ depends on / blocked
 
Reported: 2022-03-25 17:33 UTC by Guilherme de Almeida Suckevicz
Modified: 2022-08-30 18:25 UTC (History)
48 users (show)

Fixed In Version: kernel 4.11 rc1
Clone Of:
Environment:
Last Closed: 2022-08-30 18:25:55 UTC
Embargoed:


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2022-03-25 17:33:43 UTC
In do_ipt_get_ctl and do_ipt_set_ctl of ip_tables.c, there is a possible way to leak kernel information due to uninitialized data. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-120612905References: Upstream kernel.

Reference and upstream patches:
https://source.android.com/security/bulletin/pixel/2021-12-01
https://android.googlesource.com/kernel/common/+/8a1b3c7bd71ef1e7a4537216858dbe7d13eec6ed
https://android.googlesource.com/kernel/common/+/d104670ce30b9f910f39fbaad3ec59f87fa43468
https://android.googlesource.com/kernel/common/+/bb5bc03a5056b4b22f00b7333c42c861b83ef19f
https://android.googlesource.com/kernel/common/+/dcd0c8c3e87cf08344e169fdb94eb7ec96c3c32a
https://android.googlesource.com/kernel/common/+/823f05d71506017aa4d47ae8b9546081686098fe

Comment 7 Product Security DevOps Team 2022-08-30 18:25:51 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-39636


Note You need to log in before you can comment on or make changes to this bug.