LOW · 1.9

CVE-2010-4073

The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vector...

Vulnerability Description

The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.

CVSS Score

1.9

LOW

AV:L/AC:M/Au:N/C:P/I:N/A:N
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
LinuxLinux Kernel< 2.6.37
OpensuseOpensuse11.3
SuseLinux Enterprise Desktop10
SuseLinux Enterprise Real Time Extension11
SuseLinux Enterprise Server9
SuseLinux Enterprise Software Development Kit10
DebianDebian Linux5.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2010-4073?

CVE-2010-4073 is a vulnerability with a CVSS score of 1.9 (LOW). The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vector...

How severe is CVE-2010-4073?

CVE-2010-4073 has been rated LOW with a CVSS base score of 1.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2010-4073?

Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Opensuse Opensuse, Suse Linux Enterprise Desktop, Suse Linux Enterprise Real Time Extension, Suse Linux Enterprise Server.