CVE-2010-4083

Impact:
Low
Public Date:
2010-09-23
IAVA:
2011-A-0147
Bugzilla:
648673: CVE-2010-4083 kernel: ipc/sem.c: reading uninitialized stack memory

The MITRE CVE dictionary describes this issue as:

The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.

Find out more about CVE-2010-4083 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue is not planned to be fixed in Red Hat Enterprise Linux 3,
due to this product being in Extended Life Cycle Phase of its
maintenance life-cycle, where only qualified security errata of critical
impact are addressed.

For further information about the Errata Support Policy, visit:
http://www.redhat.com/security/updates/errata

CVSS v2 metrics

Base Score 1.9
Base Metrics AV:L/AC:M/Au:N/C:P/I:N/A:N
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
MRG Grid for RHEL 5 Server (kernel-rt) RHSA-2010:0958 2010-12-08
Red Hat Enterprise Linux 6 (kernel) RHSA-2011:0007 2011-01-11
Red Hat Enterprise Linux 4 (kernel) RHSA-2011:0162 2011-01-18
Red Hat Enterprise Linux 5 (kernel) RHSA-2011:0004 2011-01-04

Acknowledgements

Red Hat would like to thank Dan Rosenberg for reporting this issue.
Last Modified

CVE description copyright © 2017, The MITRE Corporation