The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel memory via vectors involving a dump operation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | * | 2.6.36 (excluding) |
Linux_kernel | Linux | 2.6.36 (including) | 2.6.36 (including) |
Linux_kernel | Linux | 2.6.36-rc1 (including) | 2.6.36-rc1 (including) |
Linux_kernel | Linux | 2.6.36-rc2 (including) | 2.6.36-rc2 (including) |
Linux_kernel | Linux | 2.6.36-rc3 (including) | 2.6.36-rc3 (including) |
Linux | Ubuntu | hardy | * |
Linux | Ubuntu | jaunty | * |
Linux | Ubuntu | karmic | * |
Linux | Ubuntu | lucid | * |
Linux | Ubuntu | upstream | * |
Linux-ec2 | Ubuntu | karmic | * |
Linux-ec2 | Ubuntu | lucid | * |
Linux-ec2 | Ubuntu | maverick | * |
Linux-ec2 | Ubuntu | upstream | * |
Linux-fsl-imx51 | Ubuntu | karmic | * |
Linux-fsl-imx51 | Ubuntu | lucid | * |
Linux-fsl-imx51 | Ubuntu | upstream | * |
Linux-lts-backport-maverick | Ubuntu | lucid | * |
Linux-lts-backport-maverick | Ubuntu | upstream | * |
Linux-mvl-dove | Ubuntu | karmic | * |
Linux-mvl-dove | Ubuntu | lucid | * |
Linux-mvl-dove | Ubuntu | maverick | * |
Linux-mvl-dove | Ubuntu | upstream | * |
Linux-source-2.6.15 | Ubuntu | upstream | * |
MRG for RHEL-5 | RedHat | kernel-rt-0:2.6.33.7-rt29.55.el5rt | * |
Red Hat Enterprise Linux 4 | RedHat | kernel-0:2.6.9-89.31.1.EL | * |
Red Hat Enterprise Linux 5 | RedHat | kernel-0:2.6.18-194.26.1.el5 | * |
Red Hat Enterprise Linux 6 | RedHat | kernel-0:2.6.32-71.14.1.el6 | * |