1
PublicDateAtUSN: 2011-01-03
2
Candidate: CVE-2010-3876
5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3876
6
https://usn.ubuntu.com/usn/usn-1071-1
7
https://usn.ubuntu.com/usn/usn-1072-1
8
https://usn.ubuntu.com/usn/usn-1073-1
9
https://usn.ubuntu.com/usn/usn-1080-1
10
https://usn.ubuntu.com/usn/usn-1081-1
11
https://usn.ubuntu.com/usn/usn-1080-2
12
https://usn.ubuntu.com/usn/usn-1093-1
13
https://usn.ubuntu.com/usn/usn-1119-1
14
https://usn.ubuntu.com/usn/usn-1164-1
15
https://usn.ubuntu.com/usn/usn-1167-1
16
https://usn.ubuntu.com/usn/usn-1187-1
18
net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not
19
properly initialize certain structure members, which allows local users to
20
obtain potentially sensitive information from kernel stack memory by
21
leveraging the CAP_NET_RAW capability to read copies of the applicable
24
Vasiliy Kulikov discovered that the Linux kernel sockets implementation did
25
not properly initialize certain structures. A local attacker could exploit
26
this to read kernel stack memory, leading to a loss of privacy.
30
Discovered-by: Vasiliy Kulikov
33
Patches_linux-source-2.6.15:
34
upstream_linux-source-2.6.15: released (2.6.37~rc2)
35
dapper_linux-source-2.6.15: released (2.6.15-55.93)
36
hardy_linux-source-2.6.15: DNE
37
karmic_linux-source-2.6.15: DNE
38
lucid_linux-source-2.6.15: DNE
39
maverick_linux-source-2.6.15: DNE
40
natty_linux-source-2.6.15: DNE
41
devel_linux-source-2.6.15: DNE
44
upstream: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=67286640f638f5ad41a946b9a3dc75327950248f
45
upstream_linux: released (2.6.37~rc2)
47
hardy_linux: released (2.6.24-28.86)
48
karmic_linux: released (2.6.31-22.73)
49
lucid_linux: released (2.6.32-29.58)
50
maverick_linux: released (2.6.35-27.47)
51
natty_linux: released (2.6.37-5.13)
52
devel_linux: not-affected (2.6.39-0.0)
54
upstream_linux-ec2: released (2.6.37~rc2)
57
karmic_linux-ec2: released (2.6.31-307.27)
58
lucid_linux-ec2: released (2.6.32-313.26)
59
maverick_linux-ec2: ignored (binary supplied by "linux" now)
63
Patches_linux-ti-omap4:
64
upstream_linux-ti-omap4: released (2.6.37~rc2)
65
dapper_linux-ti-omap4: DNE
66
hardy_linux-ti-omap4: DNE
67
karmic_linux-ti-omap4: DNE
68
lucid_linux-ti-omap4: DNE
69
maverick_linux-ti-omap4: released (2.6.35-903.22)
70
natty_linux-ti-omap4: not-affected (2.6.38-1201.2)
71
devel_linux-ti-omap4: not-affected (2.6.38-1309.13)
73
upstream_linux-lts-backport-maverick: released (2.6.37~rc2)
74
dapper_linux-lts-backport-maverick: DNE
75
hardy_linux-lts-backport-maverick: DNE
76
karmic_linux-lts-backport-maverick: DNE
77
lucid_linux-lts-backport-maverick: released (2.6.35-28.50~lucid1)
78
maverick_linux-lts-backport-maverick: DNE
79
natty_linux-lts-backport-maverick: DNE
80
devel_linux-lts-backport-maverick: DNE
82
Patches_linux-mvl-dove:
83
upstream_linux-mvl-dove: released (2.6.37~rc2)
84
dapper_linux-mvl-dove: DNE
85
hardy_linux-mvl-dove: DNE
86
karmic_linux-mvl-dove: ignored (abandonded branch)
87
lucid_linux-mvl-dove: released (2.6.32-215.31)
88
maverick_linux-mvl-dove: released (2.6.32-415.32)
89
natty_linux-mvl-dove: DNE
90
devel_linux-mvl-dove: DNE
92
Patches_linux-fsl-imx51:
93
upstream_linux-fsl-imx51: released (2.6.37~rc2)
94
dapper_linux-fsl-imx51: DNE
95
hardy_linux-fsl-imx51: DNE
96
karmic_linux-fsl-imx51: released (2.6.31-112.30)
97
lucid_linux-fsl-imx51: released (2.6.31-609.26)
98
maverick_linux-fsl-imx51: DNE
99
natty_linux-fsl-imx51: DNE
100
devel_linux-fsl-imx51: DNE
102
Patches_linux-lts-backport-natty:
103
upstream_linux-lts-backport-natty: released (2.6.37~rc2)
104
hardy_linux-lts-backport-natty: DNE
105
lucid_linux-lts-backport-natty: not-affected (2.6.38-1.27~lucid1)
106
maverick_linux-lts-backport-natty: DNE
107
natty_linux-lts-backport-natty: DNE
108
devel_linux-lts-backport-natty: DNE