CVE-2010-2942
Summary
| CVE | CVE-2010-2942 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2010-09-21 18:00:02 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c. |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Problem Types: CWE-401 | n/a
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 5.5 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
| 2.0 | [email protected] | Primary | 2.1 | AV:L/AC:L/Au:N/C:P/I:N/A:N |
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
NoneAvailability
NoneCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
NoneAvailability
NoneAV:L/AC:L/Au:N/C:P/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Avaya | Aura Communication Manager | 5.2 | All | All | All |
| Application | Avaya | Aura Presence Services | 6.0 | All | All | All |
| Application | Avaya | Aura Presence Services | 6.1 | All | All | All |
| Application | Avaya | Aura Presence Services | 6.1.1 | All | All | All |
| Application | Avaya | Aura Session Manager | 1.1 | All | All | All |
| Application | Avaya | Aura Session Manager | 5.2 | All | All | All |
| Application | Avaya | Aura Session Manager | 6.0 | All | All | All |
| Application | Avaya | Aura System Manager | 5.2 | All | All | All |
| Application | Avaya | Aura System Manager | 6.0 | All | All | All |
| Application | Avaya | Aura System Manager | 6.1 | All | All | All |
| Application | Avaya | Aura System Manager | 6.1.1 | All | All | All |
| Application | Avaya | Aura System Platform | 1.1 | All | All | All |
| Application | Avaya | Aura System Platform | 6.0 | - | All | All |
| Application | Avaya | Aura System Platform | 6.0 | sp1 | All | All |
| Application | Avaya | Iq | 5.0 | All | All | All |
| Application | Avaya | Iq | 5.1 | All | All | All |
| Application | Avaya | Voice Portal | 5.0 | All | All | All |
| Application | Avaya | Voice Portal | 5.1 | - | All | All |
| Application | Avaya | Voice Portal | 5.1 | sp1 | All | All |
| Operating System | Canonical | Ubuntu Linux | 10.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 10.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 6.06 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 8.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 9.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 9.10 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.6.36 | - | All | All |
| Operating System | Linux | Linux Kernel | 2.6.36 | rc1 | All | All |
| Operating System | Linux | Linux Kernel | All | All | All | All |
| Operating System | Opensuse | Opensuse | 11.1 | All | All | All |
| Operating System | Opensuse | Opensuse | 11.3 | All | All | All |
| Operating System | Suse | Suse Linux Enterprise Desktop | 10 | sp3 | All | All |
| Operating System | Suse | Suse Linux Enterprise Desktop | 11 | - | All | All |
| Operating System | Suse | Suse Linux Enterprise Desktop | 11 | sp1 | All | All |
| Operating System | Suse | Suse Linux Enterprise Server | 10 | sp3 | All | All |
| Operating System | Suse | Suse Linux Enterprise Server | 11 | - | All | All |
| Operating System | Suse | Suse Linux Enterprise Server | 11 | sp1 | All | All |
| Operating System | Vmware | Esx | 4.0 | All | All | All |
| Operating System | Vmware | Esx | 4.1 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:20 | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| net sched: fix some kernel memory leaks - Patchwork | af854a3a-2127-422b-91ae-364da2661108 | patchwork.ozlabs.org | Mailing List, Patch, Third Party Advisory |
| oss-security - Re: CVE request - kernel: net sched memleak | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | Mailing List, Patch, Third Party Advisory |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| SUSE update for kernel - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Broken Link |
| [security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:20 | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Bug 624903 – CVE-2010-2942 kernel: net sched: fix some kernel memory leaks | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | Issue Tracking, Patch, Third Party Advisory |
| USN-1000-1: Linux kernel vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | Third Party Advisory |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Broken Link |
| Linux Kernel 'net/sched/act_police.c' File Memory Leak Local Information Disclosure Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| About Secunia Research | Flexera | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| VMSA-2011-0012.2 | af854a3a-2127-422b-91ae-364da2661108 | www.vmware.com | Third Party Advisory |
| git.kernel.org | af854a3a-2127-422b-91ae-364da2661108 | git.kernel.org | |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Broken Link |
| oss-security - CVE request - kernel: net sched memleak | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | Mailing List, Patch, Third Party Advisory |
| 404: File not found | af854a3a-2127-422b-91ae-364da2661108 | www.kernel.org | Broken Link |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Broken Link |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Broken Link |
| [security-announce] SUSE Security Announcement: Realtime Linux Kernel (S | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| [security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:20 | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| ASA-2010-291 (RHSA-2010-0723) | af854a3a-2127-422b-91ae-364da2661108 | support.avaya.com | Third Party Advisory |
| [security-announce] SUSE Security Announcement: Linux kernel (SUSE-SA:20 | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| CONFIRM:http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=1c40be12f7d8ca1d387510d39787b12e512a7ce8 | MITRE | git.kernel.org | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| Red Hat Customer Portal | MITRE | access.redhat.com | |
| access.redhat.com | CVE-2010-2942 | MITRE | access.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.