Medium severity5.5NVD Advisory· Published Sep 21, 2010· Updated Apr 29, 2026
CVE-2010-2942
CVE-2010-2942
Description
The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.
Affected products
38cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp3:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:-:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp3:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:-:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_communication_manager:5.2:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_presence_services:6.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:avaya:aura_presence_services:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_presence_services:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_presence_services:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_session_manager:1.1:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:avaya:aura_session_manager:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_session_manager:5.2:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_session_manager:6.0:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_system_manager:5.2:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:avaya:aura_system_manager:5.2:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_system_manager:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_system_manager:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_system_manager:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_system_platform:1.1:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:avaya:aura_system_platform:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_system_platform:6.0:-:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_system_platform:6.0:sp1:*:*:*:*:*:*
cpe:2.3:a:avaya:voice_portal:5.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:avaya:voice_portal:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:voice_portal:5.1:-:*:*:*:*:*:*
- cpe:2.3:a:avaya:voice_portal:5.1:sp1:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
22- patchwork.ozlabs.org/patch/61857/nvdMailing ListPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2010/08/18/1nvdMailing ListPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2010/08/19/4nvdMailing ListPatchThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.htmlnvdMailing ListThird Party Advisory
- support.avaya.com/css/P8/documents/100113326nvdThird Party Advisory
- www.securityfocus.com/archive/1/520102/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/42529nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-1000-1nvdThird Party Advisory
- www.vmware.com/security/advisories/VMSA-2011-0012.htmlnvdThird Party Advisory
- secunia.com/advisories/41512nvdBroken Link
- secunia.com/advisories/46397nvdBroken Link
- www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc2nvdBroken Link
- www.redhat.com/support/errata/RHSA-2010-0723.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2010-0771.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2010-0779.htmlnvdBroken Link
- www.vupen.com/english/advisories/2010/2430nvdBroken Link
- www.vupen.com/english/advisories/2011/0298nvdBroken Link
News mentions
0No linked articles in our index yet.