CVE-2010-4083

Priority
Low
Description
The copy_semid_to_user function in ipc/sem.c in the Linux kernel before
2.6.36 does not initialize a certain structure, which allows local users to
obtain potentially sensitive information from kernel stack memory via a (1)
IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl
system call.
Ubuntu-Description
Dan Rosenberg discovered that the semctl syscall did not correctly clear
kernel memory. A local attacker could exploit this to read kernel stack
memory, leading to a loss of privacy.
References
Bugs
Package
Upstream:released (2.6.36~rc7)
Package
Upstream:released (2.6.36~rc7)
Package
Upstream:released (2.6.36~rc7)
Package
Upstream:released (2.6.36~rc7)
Package
Upstream:released (2.6.36~rc7)
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (2.6.36~rc7)
Patches:
Upstream:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56
Package
Upstream:released (2.6.36~rc7)
Package
Upstream:released (2.6.36~rc7)
More Information

Updated: 2018-06-26 04:38:28 UTC (commit 7799c934cca373482531a7b00e4dfe82302ceae5)