The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=1c40be12f7d8ca1d387510d39787b12e512a7ce8
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html Mailing List Third Party Advisory
http://patchwork.ozlabs.org/patch/61857/ Mailing List Patch Third Party Advisory
http://secunia.com/advisories/41512 Broken Link
http://secunia.com/advisories/46397 Broken Link
http://support.avaya.com/css/P8/documents/100113326 Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc2 Broken Link
http://www.openwall.com/lists/oss-security/2010/08/18/1 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2010/08/19/4 Mailing List Patch Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0723.html Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0771.html Broken Link
http://www.redhat.com/support/errata/RHSA-2010-0779.html Broken Link
http://www.securityfocus.com/archive/1/520102/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/42529 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1000-1 Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2011-0012.html Third Party Advisory
http://www.vupen.com/english/advisories/2010/2430 Broken Link
http://www.vupen.com/english/advisories/2011/0298 Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=624903 Issue Tracking Patch Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2010-09-21T17:00:00

Updated: 2018-10-10T18:57:01

Reserved: 2010-08-04T00:00:00


Link: CVE-2010-2942

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2010-09-21T18:00:02.127

Modified: 2023-02-13T04:21:20.207


Link: CVE-2010-2942

JSON object: View

cve-icon Redhat Information

No data.

CWE