The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
2010-12-30T19:00:03.877
2025-04-11T00:51:21.963
Deferred
CVSSv2: 2.1 (LOW)
AV:L/AC:L/Au:N/C:P/I:N/A:N
3.9
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 2.6.36.2 | Yes |
Operating System | fedoraproject | fedora | 13 | Yes |
Operating System | opensuse | opensuse | 11.2 | Yes |
Operating System | opensuse | opensuse | 11.3 | Yes |
Operating System | suse | linux_enterprise_desktop | 10 | Yes |
Operating System | suse | linux_enterprise_desktop | 11 | Yes |
Operating System | suse | linux_enterprise_real_time_extension | 11 | Yes |
Operating System | suse | linux_enterprise_server | 9 | Yes |
Operating System | suse | linux_enterprise_server | 10 | Yes |
Operating System | suse | linux_enterprise_server | 11 | Yes |
Operating System | suse | linux_enterprise_software_development_kit | 10 | Yes |