*** This bug is a security vulnerability *** Public security bug reported:
The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c. ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Tags: kernel-cve-tracker ** Package changed: ubuntu => linux (Ubuntu) ** Tags added: kernel-cve-tracker ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2010-4073 ** Visibility changed to: Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/806366 Title: CVE-2010-4073 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/806366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs