Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-4158

Опубликовано: 30 дек. 2010
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 2.1

Описание

The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

2.6.39-0.0
hardy

released

2.6.24-29.87
karmic

released

2.6.31-23.74
lucid

released

2.6.32-30.59
maverick

released

2.6.35-25.43
natty

released

2.6.37-5.13
upstream

released

2.6.37~rc2

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

DNE

karmic

released

2.6.31-308.28
lucid

released

2.6.32-314.27
maverick

ignored

end of life
natty

DNE

upstream

ignored

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

DNE

karmic

ignored

end of life
lucid

released

2.6.31-610.27
maverick

DNE

natty

DNE

upstream

released

2.6.37~rc2

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

DNE

karmic

DNE

lucid

released

2.6.35-25.44~lucid1
maverick

DNE

natty

DNE

upstream

ignored

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

2.6.38-1.27~lucid1
maverick

DNE

natty

DNE

upstream

released

2.6.37~rc2

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

DNE

karmic

ignored

end of life
lucid

released

2.6.32-216.33
maverick

released

2.6.32-416.33
natty

DNE

upstream

ignored

Показывать по

РелизСтатусПримечание
dapper

released

2.6.15-57.94
devel

DNE

hardy

DNE

karmic

DNE

lucid

DNE

maverick

DNE

natty

DNE

upstream

released

2.6.37~rc2

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

2.6.38-1309.13
hardy

DNE

karmic

DNE

lucid

DNE

maverick

released

2.6.35-903.22
natty

not-affected

2.6.38-1201.2
upstream

ignored

Показывать по

EPSS

Процентиль: 56%
0.00345
Низкий

2.1 Low

CVSS2

Связанные уязвимости

redhat
больше 14 лет назад

The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.

nvd
больше 14 лет назад

The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.

debian
больше 14 лет назад

The sk_run_filter function in net/core/filter.c in the Linux kernel be ...

github
около 3 лет назад

The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.

fstec
больше 14 лет назад

Уязвимость ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальной информации

EPSS

Процентиль: 56%
0.00345
Низкий

2.1 Low

CVSS2