CVE-2010-3298
Published: 30 September 2010
The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
From the Ubuntu security team
Dan Rosenberg discovered that several network ioctls did not clear kernel memory correctly. A local user could exploit this to read kernel stack memory, leading to a loss of privacy.
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.36~rc5)
|
Patches: Upstream: http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=7011e660938fc44ed86319c18a5954e95a82ab3e Karmic: http://chinstrap.ubuntu.com/~ogasawara/CVEs/CVE-2010-3298/patches/karmic/linux/0001-drivers-net-usb-hso.c-prevent-reading-uninitialized-me.txt Lucid: http://chinstrap.ubuntu.com/~ogasawara/CVEs/CVE-2010-3298/patches/lucid/linux/0001-drivers-net-usb-hso.c-prevent-reading-uninitialized-me.txt Maverick: http://chinstrap.ubuntu.com/~ogasawara/CVEs/CVE-2010-3298/patches/maverick/linux/0001-drivers-net-usb-hso.c-prevent-reading-uninitialized-me.txt |
||
linux-ec2 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.36~rc5)
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.36~rc5)
|
linux-lts-backport-maverick Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.36~rc5)
|
linux-source-2.6.15 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.36~rc5)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3298
- http://www.openwall.com/lists/oss-security/2010/09/14/2
- http://lkml.org/lkml/2010/9/11/167
- https://usn.ubuntu.com/usn/usn-1041-1
- https://usn.ubuntu.com/usn/usn-1074-1
- https://usn.ubuntu.com/usn/usn-1074-2
- https://usn.ubuntu.com/usn/usn-1083-1
- NVD
- Launchpad
- Debian