Описание
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | DNE | |
| devel | not-affected | 2.6.39-0.0 |
| hardy | released | 2.6.24-29.87 |
| karmic | released | 2.6.31-23.74 |
| lucid | released | 2.6.32-30.59 |
| maverick | released | 2.6.35-25.43 |
| natty | released | 2.6.37-5.13 |
| upstream | released | 2.6.37~rc2 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | DNE | |
| devel | DNE | |
| hardy | DNE | |
| karmic | released | 2.6.31-308.28 |
| lucid | released | 2.6.32-314.27 |
| maverick | ignored | end of life |
| natty | DNE | |
| upstream | ignored |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | DNE | |
| devel | DNE | |
| hardy | DNE | |
| karmic | ignored | end of life |
| lucid | released | 2.6.31-610.27 |
| maverick | DNE | |
| natty | DNE | |
| upstream | released | 2.6.37~rc2 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | DNE | |
| devel | DNE | |
| hardy | DNE | |
| karmic | DNE | |
| lucid | released | 2.6.35-25.44~lucid1 |
| maverick | DNE | |
| natty | DNE | |
| upstream | ignored |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| hardy | DNE | |
| lucid | not-affected | 2.6.38-1.27~lucid1 |
| maverick | DNE | |
| natty | DNE | |
| upstream | released | 2.6.37~rc2 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | DNE | |
| devel | DNE | |
| hardy | DNE | |
| karmic | ignored | end of life |
| lucid | released | 2.6.32-216.33 |
| maverick | released | 2.6.32-416.33 |
| natty | DNE | |
| upstream | ignored |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | released | 2.6.15-57.94 |
| devel | DNE | |
| hardy | DNE | |
| karmic | DNE | |
| lucid | DNE | |
| maverick | DNE | |
| natty | DNE | |
| upstream | released | 2.6.37~rc2 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | DNE | |
| devel | not-affected | 2.6.38-1309.13 |
| hardy | DNE | |
| karmic | DNE | |
| lucid | DNE | |
| maverick | released | 2.6.35-903.22 |
| natty | not-affected | 2.6.38-1201.2 |
| upstream | ignored |
Показывать по
Ссылки на источники
2.1 Low
CVSS2
Связанные уязвимости
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
The sk_run_filter function in net/core/filter.c in the Linux kernel be ...
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
Уязвимость ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальной информации
2.1 Low
CVSS2