The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T03:34:37.199Z
Reserved: 2010-10-25T00:00:00
Link: CVE-2010-4073

No data.

Status : Modified
Published: 2010-11-29T16:00:02.837
Modified: 2024-11-21T01:20:10.703
Link: CVE-2010-4073
