Описание
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | not-affected | 2.6.39-0.0 |
hardy | released | 2.6.24-29.87 |
karmic | released | 2.6.31-23.74 |
lucid | released | 2.6.32-30.59 |
maverick | released | 2.6.35-25.43 |
natty | released | 2.6.37-5.13 |
upstream | released | 2.6.37~rc2 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | DNE | |
karmic | released | 2.6.31-308.28 |
lucid | released | 2.6.32-314.27 |
maverick | ignored | end of life |
natty | DNE | |
upstream | ignored |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | DNE | |
karmic | ignored | end of life |
lucid | released | 2.6.31-610.27 |
maverick | DNE | |
natty | DNE | |
upstream | released | 2.6.37~rc2 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | DNE | |
karmic | DNE | |
lucid | released | 2.6.35-25.44~lucid1 |
maverick | DNE | |
natty | DNE | |
upstream | ignored |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
hardy | DNE | |
lucid | not-affected | 2.6.38-1.27~lucid1 |
maverick | DNE | |
natty | DNE | |
upstream | released | 2.6.37~rc2 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | DNE | |
hardy | DNE | |
karmic | ignored | end of life |
lucid | released | 2.6.32-216.33 |
maverick | released | 2.6.32-416.33 |
natty | DNE | |
upstream | ignored |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 2.6.15-57.94 |
devel | DNE | |
hardy | DNE | |
karmic | DNE | |
lucid | DNE | |
maverick | DNE | |
natty | DNE | |
upstream | released | 2.6.37~rc2 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | not-affected | 2.6.38-1309.13 |
hardy | DNE | |
karmic | DNE | |
lucid | DNE | |
maverick | released | 2.6.35-903.22 |
natty | not-affected | 2.6.38-1201.2 |
upstream | ignored |
Показывать по
Ссылки на источники
EPSS
2.1 Low
CVSS2
Связанные уязвимости
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
The sk_run_filter function in net/core/filter.c in the Linux kernel be ...
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
Уязвимость ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальной информации
EPSS
2.1 Low
CVSS2