Total vulnerabilities in the database
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
Software | From | Fixed in |
---|---|---|
linux / linux_kernel | - | 2.6.36.2 |
fedoraproject / fedora | 13 | 13.x |
suse / linux_enterprise_server | 10-sp3 | 10-sp3.x |
suse / linux_enterprise_desktop | 11-sp1 | 11-sp1.x |
suse / linux_enterprise_server | 11-sp1 | 11-sp1.x |
suse / linux_enterprise_server | 9 | 9.x |
opensuse / opensuse | 11.2 | 11.2.x |
opensuse / opensuse | 11.3 | 11.3.x |
suse / linux_enterprise_desktop | 10-sp3 | 10-sp3.x |
suse / linux_enterprise_software_development_kit | 10-sp3 | 10-sp3.x |
suse / linux_enterprise_real_time_extension | 11-sp1 | 11-sp1.x |