Medium severity5.5NVD Advisory· Published Sep 21, 2010· Updated Apr 29, 2026
CVE-2010-3078
CVE-2010-3078
Description
The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call.
Affected products
17cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*+ 5 more
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: <=2.6.35.4
- cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
22- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.htmlnvdMailing ListThird Party Advisory
- securitytracker.com/idnvdThird Party AdvisoryVDB Entry
- www.openwall.com/lists/oss-security/2010/09/07/1nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2010/09/07/12nvdMailing ListThird Party Advisory
- www.securityfocus.com/archive/1/520102/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/43022nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-1000-1nvdThird Party Advisory
- www.vmware.com/security/advisories/VMSA-2011-0012.htmlnvdThird Party Advisory
- secunia.com/advisories/41284nvdBroken Link
- secunia.com/advisories/41512nvdBroken Link
- secunia.com/advisories/42890nvdBroken Link
- secunia.com/advisories/46397nvdBroken Link
- www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc4nvdBroken Link
- www.linux.sgi.com/archives/xfs-masters/2010-09/msg00002.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2010-0839.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2011-0007.htmlnvdBroken Link
- www.vupen.com/english/advisories/2010/2430nvdBroken Link
- www.vupen.com/english/advisories/2011/0298nvdBroken Link
News mentions
0No linked articles in our index yet.