CVE-2010-4158

Priority
Low
Description
The sk_run_filter function in net/core/filter.c in the Linux kernel before
2.6.36.2 does not check whether a certain memory location has been
initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM
instruction, which allows local users to obtain potentially sensitive
information from kernel stack memory via a crafted socket filter.
Ubuntu-Description
Dan Rosenberg discovered that the socket filters did not correctly
initialize structure memory. A local attacker could create malicious
filters to read portions of kernel stack memory, leading to a loss of
privacy.
References
Bugs
Assigned-to
smb
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:ignored
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:ignored
Package
Upstream:ignored
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (2.6.37~rc2)
Patches:
Upstream:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=57fe93b374a6b8711995c2d466c502af9f3a08bb
Package
Upstream:ignored
Package
Upstream:released (2.6.37~rc2)
More Information

Updated: 2018-06-26 04:38:29 UTC (commit 7799c934cca373482531a7b00e4dfe82302ceae5)