2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2010-3298" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2010-09-30T15:00:02.833" ,
2024-11-22 11:14:00 +00:00
"lastModified" : "2024-11-21T01:18:27.813" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call."
} ,
{
"lang" : "es" ,
"value" : "La funci\u00f3n hso_get_count en drivers/net/usb/hso.c en el kernel Linux anterior a la versi\u00f3n 2.6.36-rc5, no inicia adecuadamente un miembro de cierta estructura, lo que permite a usuarios locales obtener informaci\u00f3n potencialmente sensible de la pila de memoria del kernel mediante una llamada ioctl TIOCGICOUNT."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N" ,
2024-11-22 11:14:00 +00:00
"baseScore" : 2.1 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-11-22 11:14:00 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-200"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.6.36" ,
"matchCriteriaId" : "C8DCE5E2-B055-4F05-8F0F-F19D1B7BA8D7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "D4407EF9-4ECF-408F-9ECB-0705E3FB65D5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "DBE26099-6D2C-4FAF-B15C-CBF985D59171"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "F2C193FF-3723-4BE9-8787-DED7D455FA8F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "F874FE6A-968D-47E1-900A-E154E41EDAF8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*" ,
"matchCriteriaId" : "14B7B8AE-CE83-4F0E-9138-6F165D97C19F"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5646FDE9-CF21-46A9-B89D-F5BBDB4249AF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "60FBDD82-691C-4D9D-B71B-F9AFF6931B53"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "640FB29C-1A84-41E1-86DE-B542EA0EF153"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "EE26596F-F10E-44EF-88CA-0080646E91B9"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8C757774-08E7-40AA-B532-6F705C8F7639"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" ,
"matchCriteriaId" : "01EDA41C-6B2E-49AF-B503-EB3882265C11"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "87614B58-24AB-49FB-9C84-E8DDBA16353B"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=7011e660938fc44ed86319c18a5954e95a82ab3e" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lkml.org/lkml/2010/9/11/167" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List" ,
"Patch" ,
"Third Party Advisory"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/41440" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/42758" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/42890" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc5" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2010/09/14/2" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List" ,
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2010/09/14/7" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List" ,
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0007.html" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/43226" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.ubuntu.com/usn/USN-1041-1" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0070" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0298" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=633140" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Issue Tracking" ,
"Patch" ,
"Third Party Advisory"
]
2024-11-22 11:14:00 +00:00
} ,
{
"url" : "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=7011e660938fc44ed86319c18a5954e95a82ab3e" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lkml.org/lkml/2010/9/11/167" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/41440" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/42758" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/42890" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc5" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2010/09/14/2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2010/09/14/7" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0007.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/43226" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.ubuntu.com/usn/USN-1041-1" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0070" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2011/0298" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=633140" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Issue Tracking" ,
"Patch" ,
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}