|Bugzilla:||648673: CVE-2010-4083 kernel: ipc/sem.c: reading uninitialized stack memory|
The MITRE CVE dictionary describes this issue as:
The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.
This issue is not planned to be fixed in Red Hat Enterprise Linux 3,
due to this product being in Extended Life Cycle Phase of its
maintenance life-cycle, where only qualified security errata of critical
impact are addressed.
For further information about the Errata Support Policy, visit:
CVSS v2 metrics
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat security errata
|MRG Grid for RHEL 5 Server (kernel-rt)||RHSA-2010:0958||December 08, 2010|
|Red Hat Enterprise Linux version 4 (kernel)||RHSA-2011:0162||January 18, 2011|
|Red Hat Enterprise Linux version 5 (kernel)||RHSA-2011:0004||January 04, 2011|
|Red Hat Enterprise Linux version 6 (kernel)||RHSA-2011:0007||January 11, 2011|
Red Hat would like to thank Dan Rosenberg for reporting this issue.
This page is generated automatically and has not been checked for errors or omissions.
For clarification or corrections please contact the Red Hat Security Response Team.