CVE-2010-4072
Publication date 29 November 2010
Last updated 24 July 2024
Ubuntu priority
The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."
From the Ubuntu Security Team
Kees Cook and Vasiliy Kulikov discovered that the shm interface did not clear kernel memory correctly. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-mvl-dove | ||
linux-source-2.6.15 | ||
linux-ti-omap4 | ||
Patch details
References
Related Ubuntu Security Notices (USN)
- USN-1057-1
- Linux kernel vulnerabilities
- 3 February 2011
- USN-1072-1
- Linux kernel vulnerabilities
- 25 February 2011
- USN-1083-1
- Linux kernel vulnerabilities
- 3 March 2011
- USN-1074-1
- Linux kernel vulnerabilities
- 25 February 2011
- USN-1041-1
- Linux kernel vulnerabilities
- 10 January 2011
- USN-1119-1
- Linux kernel (OMAP4) vulnerabilities
- 20 April 2011
- USN-1074-2
- Linux kernel vulnerabilities
- 28 February 2011
- USN-1093-1
- Linux Kernel vulnerabilities (Marvell Dove)
- 25 March 2011