CVE-2010-4072 (retired)

Priority
Description
The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before
2.6.37-rc1 does not initialize a certain structure, which allows local
users to obtain potentially sensitive information from kernel stack memory
via vectors related to the shmctl system call and the "old shm interface."
Ubuntu-Description
Kees Cook and Vasiliy Kulikov discovered that the shm interface did not
clear kernel memory correctly. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy.
Assigned-to
ogasawara
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:needs-triage
More Information

Updated: 2019-03-26 11:53:51 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)