CVE-2010-4072

CVSS v2.0 1.9 (Low)
19% Progress
EPSS 0.04 % (11th)
0.04% Progress
Affected Products 8
Advisories 26

The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."

Weaknesses
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE Status
PUBLISHED
CNA
MITRE
Published Date
2010-11-29 16:00:02
(14 years ago)
Updated Date
2023-11-07 02:06:05
(10 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel prior 2.6.37 version cpe:2.3:o:linux:linux_kernel < 2.6.37
  Linux Kernel 2.6.37 cpe:2.3:o:linux:linux_kernel:2.6.37:-

Configuration #2

    CPE23 From Up To
  Opensuse 11.3 cpe:2.3:o:opensuse:opensuse:11.3
  Suse Linux Enterprise Desktop 10 SP3 cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3
  Suse Linux Enterprise Desktop 11 SP1 cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1
  Suse Linux Enterprise Real Time Extension 11 SP1 cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1
  Suse Linux Enterprise Server 9 cpe:2.3:o:suse:linux_enterprise_server:9
  Suse Linux Enterprise Server 10 SP3 cpe:2.3:o:suse:linux_enterprise_server:10:sp3
  Suse Linux Enterprise Server 11 SP1 cpe:2.3:o:suse:linux_enterprise_server:11:sp1
  Suse Linux Enterprise Software Development Kit 10 SP3 cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3

Configuration #3

    CPE23 From Up To
  Debian Linux 5.0 cpe:2.3:o:debian:debian_linux:5.0

Configuration #4

    CPE23 From Up To
  Canonical Ubuntu Linux 6.06 cpe:2.3:o:canonical:ubuntu_linux:6.06
  Canonical Ubuntu Linux 9.10 cpe:2.3:o:canonical:ubuntu_linux:9.10
  Canonical Ubuntu Linux 10.04 cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-
  Canonical Ubuntu Linux 10.10 cpe:2.3:o:canonical:ubuntu_linux:10.10
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...