CVE-2010-4158

CVE Details

Release Date:2010-12-30

Description


The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter. The udp_queue_rcv_skb function in net/ipv4/udp.c in a certain Red Hat build of the Linux kernel 2.6.18 in Red Hat Enterprise Linux (RHEL) 5 allows attackers to cause a denial of service (deadlock and system hang) by sending UDP traffic to a socket that has a crafted socket filter, a related issue to CVE-2010-4158.

See more information about CVE-2010-4158 from MITRE CVE dictionary and NIST NVD


CVSS v2.0 metrics


NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.

Base Score: 2.1 Base Metrics: AV:L/AC:L/Au:N/C:P/I:N/A:N
Access Vector: Local network Attack Complexity: Low
Authentication: None required Confidentiality Impact: Partial
Integrity Impact: None Availability Impact: None

Errata information


PlatformErrataRelease Date
Oracle Enterprise Linux version 4 (kernel)ELSA-2011-01622011-01-18
Oracle Enterprise Linux version 4 (ocfs2-2.6.9-89.35.1.0.1.EL)ELSA-2011-01622011-01-18
Oracle Enterprise Linux version 4 (oracleasm-2.6.9-89.35.1.0.1.EL)ELSA-2011-01622011-01-18
Oracle Linux version 5 (kernel)ELSA-2011-00172011-01-20
Oracle Linux version 5 (ocfs2-2.6.18-238.el5)ELSA-2011-00172011-01-20
Oracle Linux version 5 (oracleasm-2.6.18-238.el5)ELSA-2011-00172011-01-20
Oracle Linux version 6 (kernel)ELSA-2011-00072011-02-12



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete