The tcf_act_police_dump function in net/sched/act_police.c in the actions
implementation in the network queueing functionality in the Linux kernel
before 2.6.36-rc4 does not properly initialize certain structure members,
which allows local users to obtain potentially sensitive information from
kernel memory via vectors involving a dump operation. NOTE: this
vulnerability exists because of an incomplete fix for CVE-2010-2942.
Eric Dumazet discovered that many network functions could leak kernel stack
contents. A local attacker could exploit this to read portions of kernel
memory, leading to a loss of privacy.
Updated: 2015-10-17 03:35:47 UTC (commit 10086)