The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-2126-1 New Linux 2.6.26 packages fix several issues
EUVD EUVD EUVD-2010-3855 The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
Ubuntu USN Ubuntu USN USN-1072-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1073-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1080-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1080-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1081-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1093-1 Linux Kernel vulnerabilities (Marvell Dove)
Ubuntu USN Ubuntu USN USN-1119-1 Linux kernel (OMAP4) vulnerabilities
Ubuntu USN Ubuntu USN USN-1164-1 Linux kernel vulnerabilities (i.MX51)
Ubuntu USN Ubuntu USN USN-1187-1 Linux kernel (Maverick backport) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T03:26:11.799Z

Reserved: 2010-10-08T00:00:00

Link: CVE-2010-3877

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2011-01-03T20:00:42.200

Modified: 2025-04-11T00:51:21.963

Link: CVE-2010-3877

cve-icon Redhat

Severity : Low

Publid Date: 2010-10-31T00:00:00Z

Links: CVE-2010-3877 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses