CVE-2010-3078

CVSS v3.1 5.5 (Medium)
55% Progress
CVSS v2.0 2.1 (Low)
21% Progress
EPSS 0.05 % (21th)
0.05% Progress
Affected Products 6
Advisories 9

The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call.

Weaknesses
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE Status
PUBLISHED
CNA
Red Hat, Inc.
Published Date
2010-09-21 18:00:05
(14 years ago)
Updated Date
2023-02-13 04:22:04
(19 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel 2.6.35.4 and prior versions cpe:2.3:o:linux:linux_kernel <= 2.6.35.4
  Linux Kernel 2.6.36 cpe:2.3:o:linux:linux_kernel:2.6.36:-
  Linux Kernel 2.6.36 Rc1 cpe:2.3:o:linux:linux_kernel:2.6.36:rc1
  Linux Kernel 2.6.36 Rc2 cpe:2.3:o:linux:linux_kernel:2.6.36:rc2
  Linux Kernel 2.6.36 Rc3 cpe:2.3:o:linux:linux_kernel:2.6.36:rc3

Configuration #2

    CPE23 From Up To
  Opensuse 11.1 cpe:2.3:o:opensuse:opensuse:11.1
  Opensuse 11.3 cpe:2.3:o:opensuse:opensuse:11.3
  Suse Linux Enterprise Desktop 11 SP1 cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1
  Suse Linux Enterprise Server 11 SP1 cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1

Configuration #3

    CPE23 From Up To
  Canonical Ubuntu Linux 6.06 cpe:2.3:o:canonical:ubuntu_linux:6.06
  Canonical Ubuntu Linux 8.04 cpe:2.3:o:canonical:ubuntu_linux:8.04
  Canonical Ubuntu Linux 9.04 cpe:2.3:o:canonical:ubuntu_linux:9.04
  Canonical Ubuntu Linux 9.10 cpe:2.3:o:canonical:ubuntu_linux:9.10
  Canonical Ubuntu Linux 10.04 cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-
  Canonical Ubuntu Linux 10.10 cpe:2.3:o:canonical:ubuntu_linux:10.10

Configuration #4

    CPE23 From Up To
  Vmware Esx 4.0 cpe:2.3:o:vmware:esx:4.0
  Vmware Esx 4.1 cpe:2.3:o:vmware:esx:4.1
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...