CVE-2010-3877 (retired)

Priority
Description
The get_name function in net/tipc/socket.c in the Linux kernel before
2.6.37-rc2 does not initialize a certain structure, which allows local
users to obtain potentially sensitive information from kernel stack memory
by reading a copy of this structure.
Ubuntu-Description
Vasiliy Kulikov discovered that the TIPC interface did not correctly
initialize certain structures. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy.
Assigned-to
apw
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
More Information

Updated: 2019-03-26 11:53:43 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)