1.9

CVE-2010-4072

The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version < 2.6.37
LinuxLinux Kernel Version2.6.37 Update-
OpensuseOpensuse Version11.3
SuseLinux Enterprise Desktop Version10 Updatesp3
SuseLinux Enterprise Desktop Version11 Updatesp1
SuseLinux Enterprise Real Time Extension Version11 Updatesp1
SuseLinux Enterprise Server Version10 Updatesp3
SuseLinux Enterprise Server Version11 Updatesp1
DebianDebian Linux Version5.0
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version9.10
CanonicalUbuntu Linux Version10.04 SwEdition-
CanonicalUbuntu Linux Version10.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.1% 0.24
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 1.9 3.4 2.9
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

http://lkml.org/lkml/2010/10/6/454
Patch
Third Party Advisory
http://www.securityfocus.com/bid/45054
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=648656
Third Party Advisory
Issue Tracking