CVE-2010-4158
Publication date 30 December 2010
Last updated 24 July 2024
Ubuntu priority
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
From the Ubuntu Security Team
Dan Rosenberg discovered that the socket filters did not correctly initialize structure memory. A local attacker could create malicious filters to read portions of kernel stack memory, leading to a loss of privacy.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | 11.04 natty |
Fixed 2.6.37-5.13
|
10.10 maverick |
Fixed 2.6.35-25.43
|
|
10.04 LTS lucid |
Fixed 2.6.32-30.59
|
|
9.10 karmic |
Fixed 2.6.31-23.74
|
|
8.04 LTS hardy |
Fixed 2.6.24-29.87
|
|
6.06 LTS dapper | Not in release | |
linux-ec2 | 11.04 natty | Not in release |
10.10 maverick | Ignored end of life | |
10.04 LTS lucid |
Fixed 2.6.32-314.27
|
|
9.10 karmic |
Fixed 2.6.31-308.28
|
|
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release | |
linux-fsl-imx51 | 11.04 natty | Not in release |
10.10 maverick | Not in release | |
10.04 LTS lucid |
Fixed 2.6.31-610.27
|
|
9.10 karmic | Ignored end of life | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release | |
linux-lts-backport-maverick | 11.04 natty | Not in release |
10.10 maverick | Not in release | |
10.04 LTS lucid |
Fixed 2.6.35-25.44~lucid1
|
|
9.10 karmic | Not in release | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release | |
linux-lts-backport-natty | 11.04 natty | Not in release |
10.10 maverick | Not in release | |
10.04 LTS lucid |
Not affected
|
|
8.04 LTS hardy | Not in release | |
linux-mvl-dove | 11.04 natty | Not in release |
10.10 maverick |
Fixed 2.6.32-416.33
|
|
10.04 LTS lucid |
Fixed 2.6.32-216.33
|
|
9.10 karmic | Ignored end of life | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release | |
linux-source-2.6.15 | 11.04 natty | Not in release |
10.10 maverick | Not in release | |
10.04 LTS lucid | Not in release | |
9.10 karmic | Not in release | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper |
Fixed 2.6.15-57.94
|
|
linux-ti-omap4 | 11.04 natty |
Not affected
|
10.10 maverick |
Fixed 2.6.35-903.22
|
|
10.04 LTS lucid | Not in release | |
9.10 karmic | Not in release | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release |
Patch details
Package | Patch details |
---|---|
linux |
References
Related Ubuntu Security Notices (USN)
- USN-1092-1
- Linux Kernel vulnerabilities
- 25 March 2011
- USN-1089-1
- Linux kernel vulnerabilities
- 18 March 2011
- USN-1105-1
- Linux kernel vulnerabilities
- 5 April 2011
- USN-1083-1
- Linux kernel vulnerabilities
- 3 March 2011
- USN-1054-1
- Linux kernel vulnerabilities
- 1 February 2011
- USN-1204-1
- Linux kernel (i.MX51) vulnerabilities
- 13 September 2011
- USN-1119-1
- Linux kernel (OMAP4) vulnerabilities
- 20 April 2011
- USN-1086-1
- Linux kernel (EC2) vulnerabilities
- 8 March 2011
- USN-1093-1
- Linux Kernel vulnerabilities (Marvell Dove)
- 25 March 2011