Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-4072

Опубликовано: 06 окт. 2010
Источник: redhat
CVSS2: 1.9
EPSS Низкий

Описание

The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."

Отчет

This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Extended Life Cycle Phase of its maintenance life-cycle, where only qualified security errata of critical impact are addressed. For further information about the Errata Support Policy, visit: http://www.redhat.com/security/updates/errata

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=648656kernel: ipc/shm.c: reading uninitialized stack memory

EPSS

Процентиль: 28%
0.00096
Низкий

1.9 Low

CVSS2

Связанные уязвимости

ubuntu
больше 14 лет назад

The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."

nvd
больше 14 лет назад

The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."

debian
больше 14 лет назад

The copy_shmid_to_user function in ipc/shm.c in the Linux kernel befor ...

github
около 3 лет назад

The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."

fstec
больше 14 лет назад

Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 28%
0.00096
Низкий

1.9 Low

CVSS2