CVE-2010-4072

Impact:
Low
Public Date:
2010-10-06
IAVA:
2011-A-0147
Bugzilla:
648656: CVE-2010-4072 kernel: ipc/shm.c: reading uninitialized stack memory

The MITRE CVE dictionary describes this issue as:

The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."

Find out more about CVE-2010-4072 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Extended Life Cycle Phase of its maintenance life-cycle, where only qualified security errata of critical impact are addressed.

For further information about the Errata Support Policy, visit:
http://www.redhat.com/security/updates/errata

CVSS v2 metrics

Base Score 1.9
Base Metrics AV:L/AC:M/Au:N/C:P/I:N/A:N
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
MRG Grid for RHEL 5 Server (kernel-rt) RHSA-2010:0958 2010-12-08
Red Hat Enterprise Linux 6 (kernel) RHSA-2011:0007 2011-01-11
Red Hat Enterprise Linux 4 (kernel) RHSA-2011:0162 2011-01-18
Red Hat Enterprise Linux 5 (kernel) RHSA-2011:0017 2011-01-13

Acknowledgements

Red Hat would like to thank Vasiliy Kulikov of Openwall and Kees Cook for reporting this issue.
Last Modified

CVE description copyright © 2017, The MITRE Corporation