Release Date: | 2010-09-21 |
The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c. The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel memory via vectors involving a dump operation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.
See more information about CVE-2010-2942 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.
Base Score: | 2.1 | Base Metrics: | AV:L/AC:L/Au:N/C:P/I:N/A:N |
Access Vector: | Local network | Attack Complexity: | Low |
Authentication: | None required | Confidentiality Impact: | Partial |
Integrity Impact: | None | Availability Impact: | None |
Platform | Errata | Release Date |
Oracle Enterprise Linux version 4 (kernel) | ELSA-2010-0779 | 2010-10-20 |
Oracle Enterprise Linux version 4 (ocfs2-2.6.9-89.31.1.0.1.EL) | ELSA-2010-0779 | 2010-10-20 |
Oracle Enterprise Linux version 4 (oracleasm-2.6.9-89.31.1.0.1.EL) | ELSA-2010-0779 | 2010-10-20 |
Oracle Linux version 5 (kernel) | ELSA-2010-0723 | 2010-09-29 |
Oracle Linux version 5 (ocfs2-2.6.18-194.17.1.0.1.el5) | ELSA-2010-0723 | 2010-09-29 |
Oracle Linux version 5 (oracleasm-2.6.18-194.17.1.0.1.el5) | ELSA-2010-0723 | 2010-09-29 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team