The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
https://exchange.xforce.ibmcloud.com/vulnerabilities/64578
https://bugzilla.redhat.com/show_bug.cgi?id=649717
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
http://www.securityfocus.com/bid/44630
http://www.securityfocus.com/archive/1/520102/100/0/threaded
http://www.redhat.com/support/errata/RHSA-2011-0017.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
http://www.debian.org/security/2010/dsa-2126
http://secunia.com/advisories/46397
http://secunia.com/advisories/42884
http://openwall.com/lists/oss-security/2010/11/04/5
http://openwall.com/lists/oss-security/2010/11/02/7