| Severity : |
Low
|
| Published : |
2010-12-30
|
| Modified : |
2012-03-19
|
| Base Score : |
2.1
|
| Details : |
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
|
| Product/Version : |
Professional PRO 5.0
MVL6 Kernel 2.6.24
Professional PRO 5.0
Pro 4.x
CGE 4.x
Mobilinux 4.x
Pro 4.x
CGE 4.x
Mobilinux 4.x
CGE 5.x
Mobilinux 5.x
|
|
CVE Vulnerabilities List CVE-2010