Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!Close

CVE-2010-4073

Published: 29 November 2010

The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.

From the Ubuntu Security Team

Dan Rosenberg discovered that IPC structures were not correctly initialized on 64bit systems. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.

Notes

AuthorNote
jdstrand
dapper_linux-source-2.6.15 was marked as pending, but it was not
included in 2.6.15-57.94. Marking as needed.

Priority

Low

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy
Released (2.6.24-29.92)
karmic
Released (2.6.31-22.73)
lucid
Released (2.6.32-28.52)
maverick
Released (2.6.35-25.43)
natty Not vulnerable
(2.6.37-2.9)
upstream
Released (2.6.37~rc1)
Patches:
upstream: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=03145beb455cf5c20a761e8451e30b8a74ba58d9
hardy: http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-4073/patches/hardy/linux/0001-ipc-initialize-structure-memory-to-zero-for-compat-fun.txt
karmic: http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-4073/patches/karmic/linux/0001-ipc-initialize-structure-memory-to-zero-for-compat-fun.txt
lucid: http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-4073/patches/lucid/linux/0001-ipc-initialize-structure-memory-to-zero-for-compat-fun.txt
maverick: http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-4073/patches/maverick/linux/0001-ipc-initialize-structure-memory-to-zero-for-compat-fun.txt

linux-ec2
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy Does not exist

karmic
Released (2.6.31-307.27)
lucid
Released (2.6.32-312.24)
maverick Ignored
(end of life)
natty Does not exist

upstream
Released (2.6.37~rc1)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy Does not exist

karmic
Released (2.6.31-112.30)
lucid
Released (2.6.31-608.22)
maverick Does not exist

natty Does not exist

upstream
Released (2.6.37~rc1)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy Does not exist

karmic Does not exist

lucid
Released (2.6.35-25.44~lucid1)
maverick Does not exist

natty Does not exist

upstream
Released (2.6.37~rc1)
linux-lts-backport-natty
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Not vulnerable
(2.6.38-1.27~lucid1)
maverick Does not exist

natty Does not exist

upstream
Released (2.6.37~rc1)
linux-mvl-dove
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy Does not exist

karmic Ignored
(end of life)
lucid
Released (2.6.32-214.30)
maverick
Released (2.6.32-414.30)
natty Does not exist

upstream
Released (2.6.37~rc1)
linux-source-2.6.15
Launchpad, Ubuntu, Debian
dapper Ignored

hardy Does not exist

karmic Does not exist

lucid Does not exist

maverick Does not exist

natty Does not exist

upstream
Released (2.6.37~rc1)
Patches:





dapper: http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-4073/patches/dapper/linux/0001-ipc-initialize-structure-memory-to-zero-for-compat-fun.txt
linux-ti-omap4
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy Does not exist

karmic Does not exist

lucid Does not exist

maverick
Released (2.6.35-903.23)
natty Not vulnerable
(2.6.38-1201.2)
upstream
Released (2.6.37~rc1)