MEDIUM · 5.5

CVE-2010-2942

The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which all...

Vulnerability Description

The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.

CVSS Score

5.5

MEDIUM

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
LinuxLinux Kernel<= 2.6.35.13
CanonicalUbuntu Linux6.06
OpensuseOpensuse11.1
SuseSuse Linux Enterprise Desktop10
SuseSuse Linux Enterprise Server10
AvayaAura Communication Manager5.2
AvayaAura Presence Services6.0
AvayaAura Session Manager1.1
AvayaAura System Manager5.2
AvayaAura System Platform1.1
AvayaIq5.0
AvayaVoice Portal5.0
VmwareEsx4.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2010-2942?

CVE-2010-2942 is a vulnerability with a CVSS score of 5.5 (MEDIUM). The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which all...

How severe is CVE-2010-2942?

CVE-2010-2942 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2010-2942?

Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Canonical Ubuntu Linux, Opensuse Opensuse, Suse Suse Linux Enterprise Desktop, Suse Suse Linux Enterprise Server.