Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-4077

Опубликовано: 29 нояб. 2010
Источник: debian
EPSS Низкий

Описание

The ntty_ioctl_tiocgicount function in drivers/char/nozomi.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.37-1package
linux-2.6fixed2.6.32-31wheezypackage
linux-2.6fixed2.6.32-31squeezepackage

EPSS

Процентиль: 63%
0.00449
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

The ntty_ioctl_tiocgicount function in drivers/char/nozomi.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.

redhat
почти 15 лет назад

The ntty_ioctl_tiocgicount function in drivers/char/nozomi.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.

nvd
больше 14 лет назад

The ntty_ioctl_tiocgicount function in drivers/char/nozomi.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.

github
около 3 лет назад

The ntty_ioctl_tiocgicount function in drivers/char/nozomi.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.

oracle-oval
больше 14 лет назад

ELSA-2011-0007: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 63%
0.00449
Низкий