CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
20.3%
The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.36 | cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:* |
linux | linux_kernel | 2.6.36 | cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:* |
canonical | ubuntu_linux | 6.06 | cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 8.04 | cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 9.04 | cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 9.10 | cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 10.04 | cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* |
canonical | ubuntu_linux | 10.10 | cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:* |
opensuse | opensuse | 11.1 | cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* |
git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=1c40be12f7d8ca1d387510d39787b12e512a7ce8
lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html
lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html
lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
patchwork.ozlabs.org/patch/61857/
secunia.com/advisories/41512
secunia.com/advisories/46397
support.avaya.com/css/P8/documents/100113326
www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc2
www.openwall.com/lists/oss-security/2010/08/18/1
www.openwall.com/lists/oss-security/2010/08/19/4
www.redhat.com/support/errata/RHSA-2010-0723.html
www.redhat.com/support/errata/RHSA-2010-0771.html
www.redhat.com/support/errata/RHSA-2010-0779.html
www.securityfocus.com/archive/1/520102/100/0/threaded
www.securityfocus.com/bid/42529
www.ubuntu.com/usn/USN-1000-1
www.vmware.com/security/advisories/VMSA-2011-0012.html
www.vupen.com/english/advisories/2010/2430
www.vupen.com/english/advisories/2011/0298
bugzilla.redhat.com/show_bug.cgi?id=624903
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
20.3%