CVE-2010-3296

CVSS v2.0 2.1 (Low)
21% Progress
EPSS 0.04 % (11th)
0.04% Progress
Affected Products 7
Advisories 11

The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.

Weaknesses
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE Status
PUBLISHED
CNA
Red Hat, Inc.
Published Date
2010-09-30 15:00:02
(14 years ago)
Updated Date
2023-02-13 04:22:59
(19 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel prior 2.6.36 version cpe:2.3:o:linux:linux_kernel < 2.6.36
  Linux Kernel 2.6.36 cpe:2.3:o:linux:linux_kernel:2.6.36:-
  Linux Kernel 2.6.36 Rc1 cpe:2.3:o:linux:linux_kernel:2.6.36:rc1
  Linux Kernel 2.6.36 Rc2 cpe:2.3:o:linux:linux_kernel:2.6.36:rc2
  Linux Kernel 2.6.36 Rc3 cpe:2.3:o:linux:linux_kernel:2.6.36:rc3
  Linux Kernel 2.6.36 Rc4 cpe:2.3:o:linux:linux_kernel:2.6.36:rc4

Configuration #2

    CPE23 From Up To
  Opensuse 11.1 cpe:2.3:o:opensuse:opensuse:11.1
  Suse Linux Enterprise Desktop 11 cpe:2.3:o:suse:linux_enterprise_desktop:11:-
  Suse Linux Enterprise Desktop 11 SP1 cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1
  Suse Linux Enterprise Real Time Extension 11 SP1 cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1
  Suse Linux Enterprise Server 11 cpe:2.3:o:suse:linux_enterprise_server:11:-
  Suse Linux Enterprise Server 11 SP1 cpe:2.3:o:suse:linux_enterprise_server:11:sp1

Configuration #3

    CPE23 From Up To
  Debian Linux 5.0 cpe:2.3:o:debian:debian_linux:5.0

Configuration #4

    CPE23 From Up To
  Canonical Ubuntu Linux 9.10 cpe:2.3:o:canonical:ubuntu_linux:9.10
  Canonical Ubuntu Linux 10.04 cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-
  Canonical Ubuntu Linux 10.10 cpe:2.3:o:canonical:ubuntu_linux:10.10
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...