CVE-2010-4075
Published: 29 November 2010
The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel before 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
From the Ubuntu Security Team
Dan Rosenberg discovered that multiple terminal ioctls did not correctly initialize structure memory. A local attacker could exploit this to read portions of kernel stack memory, leading to a loss of privacy.
Notes
Author | Note |
---|---|
jdstrand |
applied on dapper_linux-source-2.6.15 2.6.15-57.94, but not in changelog |
Priority
Status
Package | Release | Status |
---|---|---|
linux
Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Released
(2.6.24-29.87)
|
|
karmic |
Released
(2.6.31-23.74)
|
|
lucid |
Released
(2.6.32-30.59)
|
|
maverick |
Released
(2.6.35-28.49)
|
|
natty |
Not vulnerable
(2.6.37-2.9)
|
|
upstream |
Released
(2.6.37~rc1)
|
|
Patches:
upstream: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d281da7ff6f70efca0553c288bb883e8605b3862 |
||
linux-ec2
Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Does not exist
|
|
karmic |
Released
(2.6.31-308.28)
|
|
lucid |
Released
(2.6.32-314.27)
|
|
maverick |
Ignored
(end of life)
|
|
natty |
Does not exist
|
|
upstream |
Released
(2.6.37~rc1)
|
|
linux-fsl-imx51
Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Does not exist
|
|
karmic |
Ignored
(end of life)
|
|
lucid |
Released
(2.6.31-610.27)
|
|
maverick |
Does not exist
|
|
natty |
Does not exist
|
|
upstream |
Released
(2.6.37~rc1)
|
|
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Does not exist
|
|
karmic |
Does not exist
|
|
lucid |
Released
(2.6.35-28.50~lucid1)
|
|
maverick |
Does not exist
|
|
natty |
Does not exist
|
|
upstream |
Released
(2.6.37~rc1)
|
|
linux-lts-backport-natty
Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Not vulnerable
(2.6.38-1.27~lucid1)
|
|
maverick |
Does not exist
|
|
natty |
Does not exist
|
|
upstream |
Released
(2.6.37~rc1)
|
|
linux-mvl-dove
Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Does not exist
|
|
karmic |
Ignored
(end of life)
|
|
lucid |
Released
(2.6.32-216.33)
|
|
maverick |
Released
(2.6.32-416.33)
|
|
natty |
Does not exist
|
|
upstream |
Released
(2.6.37~rc1)
|
|
linux-source-2.6.15
Launchpad, Ubuntu, Debian |
dapper |
Released
(2.6.15-57.94)
|
hardy |
Does not exist
|
|
karmic |
Does not exist
|
|
lucid |
Does not exist
|
|
maverick |
Does not exist
|
|
natty |
Does not exist
|
|
upstream |
Released
(2.6.37~rc1)
|
|
linux-ti-omap4
Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Does not exist
|
|
karmic |
Does not exist
|
|
lucid |
Does not exist
|
|
maverick |
Released
(2.6.35-903.23)
|
|
natty |
Not vulnerable
(2.6.38-1201.2)
|
|
upstream |
Released
(2.6.37~rc1)
|
References
- http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1
- http://lkml.indiana.edu/hypermail//linux/kernel/1009.1/03388.html
- https://ubuntu.com/security/notices/USN-1089-1
- https://ubuntu.com/security/notices/USN-1090-1
- https://ubuntu.com/security/notices/USN-1092-1
- https://ubuntu.com/security/notices/USN-1093-1
- https://ubuntu.com/security/notices/USN-1105-1
- https://ubuntu.com/security/notices/USN-1086-1
- https://ubuntu.com/security/notices/USN-1187-1
- https://ubuntu.com/security/notices/USN-1202-1
- https://ubuntu.com/security/notices/USN-1204-1
- https://www.cve.org/CVERecord?id=CVE-2010-4075
- NVD
- Launchpad
- Debian