CVE-2010-4158

Priority
Description
The sk_run_filter function in net/core/filter.c in the Linux kernel before
2.6.36.2 does not check whether a certain memory location has been
initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM
instruction, which allows local users to obtain potentially sensitive
information from kernel stack memory via a crafted socket filter.
Ubuntu-Description
Dan Rosenberg discovered that the socket filters did not correctly
initialize structure memory. A local attacker could create malicious
filters to read portions of kernel stack memory, leading to a loss of
privacy.
Assigned-to
smb
Notes
Package
Upstream:ignored
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:ignored
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:ignored
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:ignored
More Information

Updated: 2019-12-05 20:55:56 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)