CVE-2010-3877 (retired)

Priority
Description
The get_name function in net/tipc/socket.c in the Linux kernel before
2.6.37-rc2 does not initialize a certain structure, which allows local
users to obtain potentially sensitive information from kernel stack memory
by reading a copy of this structure.
Ubuntu-Description
Vasiliy Kulikov discovered that the TIPC interface did not correctly
initialize certain structures. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy.
Assigned-to
apw
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
Package
Upstream:released (2.6.37~rc2)
More Information

Updated: 2019-09-19 15:33:54 UTC (commit d32ebc32606b9517c6fa7d65a15441e2a57a6de5)