Total vulnerabilities in the database
The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.
Software | From | Fixed in |
---|---|---|
linux / linux_kernel | - | 2.6.36 |
suse / linux_enterprise_server | 10-sp3 | 10-sp3.x |
suse / linux_enterprise_desktop | 11-sp1 | 11-sp1.x |
suse / linux_enterprise_server | 11-sp1 | 11-sp1.x |
suse / linux_enterprise_server | 9 | 9.x |
opensuse / opensuse | 11.3 | 11.3.x |
suse / linux_enterprise_desktop | 10-sp3 | 10-sp3.x |
suse / linux_enterprise_software_development_kit | 10-sp3 | 10-sp3.x |
suse / linux_enterprise_real_time_extension | 11-sp1 | 11-sp1.x |
debian / debian_linux | 5.0 | 5.0.x |