5.5

CVE-2010-2942

The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version <= 2.6.35.13
LinuxLinux Kernel Version2.6.36 Update-
LinuxLinux Kernel Version2.6.36 Updaterc1
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version8.04
CanonicalUbuntu Linux Version9.04
CanonicalUbuntu Linux Version9.10
CanonicalUbuntu Linux Version10.04 SwEdition-
CanonicalUbuntu Linux Version10.10
OpensuseOpensuse Version11.1
OpensuseOpensuse Version11.3
SuseSuse Linux Enterprise Desktop Version10 Updatesp3
SuseSuse Linux Enterprise Desktop Version11 Update-
SuseSuse Linux Enterprise Desktop Version11 Updatesp1
SuseSuse Linux Enterprise Server Version10 Updatesp3
SuseSuse Linux Enterprise Server Version11 Update-
SuseSuse Linux Enterprise Server Version11 Updatesp1
AvayaAura Presence Services Version6.0
AvayaAura Presence Services Version6.1
AvayaAura Presence Services Version6.1.1
AvayaAura Session Manager Version1.1
AvayaAura Session Manager Version5.2
AvayaAura Session Manager Version6.0
AvayaAura System Manager Version5.2
AvayaAura System Manager Version6.0
AvayaAura System Manager Version6.1
AvayaAura System Manager Version6.1.1
AvayaAura System Platform Version1.1
AvayaAura System Platform Version6.0 Update-
AvayaAura System Platform Version6.0 Updatesp1
AvayaIq Version5.0
AvayaIq Version5.1
AvayaVoice Portal Version5.0
AvayaVoice Portal Version5.1 Update-
AvayaVoice Portal Version5.1 Updatesp1
VMwareEsx Version4.0
VMwareEsx Version4.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.06% 0.188
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 2.1 3.9 2.9
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE-401 Missing Release of Memory after Effective Lifetime

The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.

http://patchwork.ozlabs.org/patch/61857/
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2010/08/18/1
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2010/08/19/4
Patch
Third Party Advisory
Mailing List
http://www.securityfocus.com/bid/42529
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=624903
Patch
Third Party Advisory
Issue Tracking