Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-3875

Опубликовано: 31 окт. 2010
Источник: redhat
CVSS2: 1.9
EPSS Низкий

Описание

The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.

Отчет

This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG as they did not include support for Amateur Radio AX.25 protocol. This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Extended Life Cycle Phase of its maintenance life-cycle, where only qualified security errata of critical impact are addressed. For further information about the Errata Support Policy, visit: http://www.redhat.com/security/updates/errata

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=649713kernel: net/ax25/af_ax25.c: reading uninitialized stack memory

EPSS

Процентиль: 22%
0.00073
Низкий

1.9 Low

CVSS2

Связанные уязвимости

ubuntu
около 15 лет назад

The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.

nvd
около 15 лет назад

The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.

debian
около 15 лет назад

The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel be ...

github
больше 3 лет назад

The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.

suse-cvrf
почти 14 лет назад

Security update for Kernel

EPSS

Процентиль: 22%
0.00073
Низкий

1.9 Low

CVSS2