CVE-2010-4072

Priority
Low
Description
The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before
2.6.37-rc1 does not initialize a certain structure, which allows local
users to obtain potentially sensitive information from kernel stack memory
via vectors related to the shmctl system call and the "old shm interface."
Ubuntu-Description
Kees Cook and Vasiliy Kulikov discovered that the shm interface did not
clear kernel memory correctly. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy.
References
Assigned-to
ogasawara
Package
Upstream:not-affected
Patches:
Dapper:http://chinstrap.ubuntu.com/~ogasawara/CVEs/CVE-2010-4072/patches/dapper/linux/0001-ipc-shm-fix-information-leak-to-userland.txt
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Source: linux (LP Ubuntu Debian)
Upstream:needs-triage
Patches:
Proposed:http://lkml.org/lkml/2010/10/6/486
Hardy:http://chinstrap.ubuntu.com/~ogasawara/CVEs/CVE-2010-4072/patches/hardy/linux/0001-ipc-shm-fix-information-leak-to-userland.txt
Karmic:http://chinstrap.ubuntu.com/~ogasawara/CVEs/CVE-2010-4072/patches/karmic/linux/0001-ipc-shm-fix-information-leak-to-userland.txt
Lucid:http://chinstrap.ubuntu.com/~ogasawara/CVEs/CVE-2010-4072/patches/lucid/linux/0001-ipc-shm-fix-information-leak-to-userland.txt
Maverick:http://chinstrap.ubuntu.com/~ogasawara/CVEs/CVE-2010-4072/patches/maverick/linux/0001-ipc-shm-fix-information-leak-to-userland.txt
Package
Upstream:needs-triage
Package
Upstream:needs-triage
More Information

Updated: 2018-06-26 04:38:26 UTC (commit 7799c934cca373482531a7b00e4dfe82302ceae5)