CVE-2010-4655
Published: 25 January 2011
net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability for an ethtool ioctl call.
From the Ubuntu security team
Kees Cook discovered that some ethtool functions did not correctly clear heap memory. A local attacker with CAP_NET_ADMIN privileges could exploit this to read portions of kernel heap memory, leading to a loss of privacy.
Priority
CVSS 3 base score: 5.5
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.38~rc3)
|
Patches: Upstream: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=b00916b189d13a615ff05c9242201135992fcda3 Introduced by a77f5db361ed9953b5b749353ea2c7fed2bf8d93 Fixed by b7c7d01aaed1f71d9afe815a569f0a81465a1744 |
||
linux-ec2 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.38~rc3)
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.38~rc3)
|
linux-lts-backport-maverick Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.38~rc3)
|
linux-lts-backport-natty Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.38~rc3)
|
linux-mvl-dove Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.38~rc3)
|
linux-source-2.6.15 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.38~rc3)
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.6.38~rc3)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4655
- https://usn.ubuntu.com/usn/usn-1146-1
- https://usn.ubuntu.com/usn/usn-1041-1
- https://usn.ubuntu.com/usn/usn-1093-1
- https://usn.ubuntu.com/usn/usn-1164-1
- https://usn.ubuntu.com/usn/usn-1083-1
- https://usn.ubuntu.com/usn/usn-1202-1
- NVD
- Launchpad
- Debian