The copy_semid_to_user function in ipc/sem.c in the Linux kernel prior to 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel |
||
suse linux enterprise server 10 |
||
suse linux enterprise desktop 11 |
||
suse linux enterprise server 11 |
||
suse linux enterprise server 9 |
||
opensuse opensuse 11.3 |
||
suse linux enterprise desktop 10 |
||
suse linux enterprise software development kit 10 |
||
suse linux enterprise real time extension 11 |
||
debian debian linux 5.0 |