CVE-2010-4158

EUVD-2010-4134
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
2.1 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 41%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
𝑥
< 2.6.36.2
opensuseopensuse
11.2
opensuseopensuse
11.3
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
dapper
dne
hardy
Fixed 2.6.24-29.87
released
karmic
Fixed 2.6.31-23.74
released
lucid
Fixed 2.6.32-30.59
released
maverick
Fixed 2.6.35-25.43
released
natty
Fixed 2.6.37-5.13
released
linux-ec2
dapper
dne
hardy
dne
karmic
Fixed 2.6.31-308.28
released
lucid
Fixed 2.6.32-314.27
released
maverick
ignored
natty
dne
linux-fsl-imx51
dapper
dne
hardy
dne
karmic
ignored
lucid
Fixed 2.6.31-610.27
released
maverick
dne
natty
dne
linux-lts-backport-maverick
dapper
dne
hardy
dne
karmic
dne
lucid
Fixed 2.6.35-25.44~lucid1
released
maverick
dne
natty
dne
linux-lts-backport-natty
hardy
dne
lucid
not-affected
maverick
dne
natty
dne
linux-mvl-dove
dapper
dne
hardy
dne
karmic
ignored
lucid
Fixed 2.6.32-216.33
released
maverick
Fixed 2.6.32-416.33
released
natty
dne
linux-source-2.6.15
dapper
Fixed 2.6.15-57.94
released
hardy
dne
karmic
dne
lucid
dne
maverick
dne
natty
dne
linux-ti-omap4
dapper
dne
hardy
dne
karmic
dne
lucid
dne
maverick
Fixed 2.6.35-903.22
released
natty
not-affected
References