VYPR
Medium severity5.5NVD Advisory· Published May 24, 2012· Updated Apr 29, 2026

CVE-2011-2898

CVE-2011-2898

Description

net/packet/af_packet.c in the Linux kernel before 2.6.39.3 does not properly restrict user-space access to certain packet data structures associated with VLAN Tag Control Information, which allows local users to obtain potentially sensitive information via a crafted application.

Affected products

1
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
    Range: <2.6.39.3

Patches

1
13fcb7bd3221

af_packet: prevent information leak

https://github.com/torvalds/linuxEric DumazetJun 7, 2011via nvd-ref
2 files changed · +4 0
  • include/linux/if_packet.h+2 0 modified
    @@ -62,6 +62,7 @@ struct tpacket_auxdata {
     	__u16		tp_mac;
     	__u16		tp_net;
     	__u16		tp_vlan_tci;
    +	__u16		tp_padding;
     };
     
     /* Rx ring - header status */
    @@ -101,6 +102,7 @@ struct tpacket2_hdr {
     	__u32		tp_sec;
     	__u32		tp_nsec;
     	__u16		tp_vlan_tci;
    +	__u16		tp_padding;
     };
     
     #define TPACKET2_HDRLEN		(TPACKET_ALIGN(sizeof(struct tpacket2_hdr)) + sizeof(struct sockaddr_ll))
    
  • net/packet/af_packet.c+2 0 modified
    @@ -804,6 +804,7 @@ static int tpacket_rcv(struct sk_buff *skb, struct net_device *dev,
     		} else {
     			h.h2->tp_vlan_tci = 0;
     		}
    +		h.h2->tp_padding = 0;
     		hdrlen = sizeof(*h.h2);
     		break;
     	default:
    @@ -1736,6 +1737,7 @@ static int packet_recvmsg(struct kiocb *iocb, struct socket *sock,
     		} else {
     			aux.tp_vlan_tci = 0;
     		}
    +		aux.tp_padding = 0;
     		put_cmsg(msg, SOL_PACKET, PACKET_AUXDATA, sizeof(aux), &aux);
     	}
     
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.