CVE-2010-4083

Published: 30 November 2010

The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.

From the Ubuntu security team

Dan Rosenberg discovered that the semctl syscall did not correctly clear kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.

Priority

Low

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.36~rc7)
Patches:
Upstream: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.36~rc7)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.36~rc7)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.36~rc7)
linux-lts-backport-natty
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.36~rc7)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.36~rc7)
linux-source-2.6.15
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.36~rc7)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.36~rc7)