First published: Mon Nov 01 2010(Updated: )
Description of problem: The compat ipc functions allow unprivileged users to read uninitialized stack memory, because some of the structures used and declared on the stack are not altered or zeroed before being copied back to the user. Reference: <a href="http://www.openwall.com/lists/oss-security/2010/10/07/1">http://www.openwall.com/lists/oss-security/2010/10/07/1</a> <a href="http://lkml.org/lkml/2010/10/6/492">http://lkml.org/lkml/2010/10/6/492</a> Acknowledgements: Red Hat would like to thank Dan Rosenberg for reporting this issue.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.37 | |
openSUSE | =11.3 | |
SUSE Linux Enterprise Desktop with Beagle | =10-sp3 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp1 | |
SUSE Linux Enterprise Real Time Extension | =11-sp1 | |
SUSE Linux Enterprise Server | =9 | |
SUSE Linux Enterprise Server | =10-sp3 | |
SUSE Linux Enterprise Server | =11-sp1 | |
SUSE Linux Enterprise Software Development Kit | =10-sp3 | |
Debian GNU/Linux | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2010-4073 is considered medium due to the potential for unprivileged users to read uninitialized stack memory.
To fix CVE-2010-4073, update to a kernel version later than 2.6.37 which addresses the vulnerability.
CVE-2010-4073 affects various distributions that use the Linux kernel versions prior to 2.6.37.
The flaw in CVE-2010-4073 allows unprivileged users to access uninitialized stack memory due to inadequate cleanup of stack structures.
No, CVE-2010-4073 requires local access to exploit the vulnerability because it involves reading stack memory.