~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
PublicDateAtUSN: 2010-09-21
Candidate: CVE-2010-3080
PublicDate: 2010-09-21
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3080
 http://www.ubuntu.com/usn/usn-1000-1
 http://www.ubuntu.com/usn/usn-1074-1
 http://www.ubuntu.com/usn/usn-1074-2
 http://www.ubuntu.com/usn/usn-1083-1
 http://www.ubuntu.com/usn/usn-1093-1
 http://www.ubuntu.com/usn/usn-1119-1
Description:
 Double free vulnerability in the snd_seq_oss_open function in
 sound/core/seq/oss/seq_oss_init.c in the Linux kernel before 2.6.36-rc4
 might allow local users to cause a denial of service or possibly have
 unspecified other impact via an unsuccessful attempt to open the
 /dev/sequencer device.
Ubuntu-Description:
 Tavis Ormandy discovered that the OSS sequencer device did not correctly
 shut down. A local attacker could exploit this to crash the system or
 possibly gain root privileges.
Notes:
Bugs:
Priority: medium
Discovered-by: Tavis Ormandy
Assigned-to: sconklin

Patches_linux-source-2.6.15:
 dapper: http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-3080/patches/dapper/linux/0001-ALSA-seq-oss-Fix-double-free-at-error-path-of-snd_seq_.txt
upstream_linux-source-2.6.15: released (2.6.36~rc4)
dapper_linux-source-2.6.15: released (2.6.15-55.89)
hardy_linux-source-2.6.15: DNE
jaunty_linux-source-2.6.15: DNE
karmic_linux-source-2.6.15: DNE
lucid_linux-source-2.6.15: DNE
maverick_linux-source-2.6.15: DNE
devel_linux-source-2.6.15: DNE

Patches_linux:
 break-fix: - 27f7ad53829f79e799a253285318bff79ece15bd
 hardy: http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-3080/patches/hardy/linux/0001-ALSA-seq-oss-Fix-double-free-at-error-path-of-snd_seq_.txt
 jaunty: http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-3080/patches/jaunty/linux/0001-ALSA-seq-oss-Fix-double-free-at-error-path-of-snd_seq_.txt
 karmic: http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-3080/patches/karmic/linux/0001-ALSA-seq-oss-Fix-double-free-at-error-path-of-snd_seq_.txt
 lucid: http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-3080/patches/lucid/linux/0001-ALSA-seq-oss-Fix-double-free-at-error-path-of-snd_seq_.txt
upstream_linux: released (2.6.36~rc4)
dapper_linux: DNE
hardy_linux: released (2.6.24-28.80)
jaunty_linux: released (2.6.28-19.66)
karmic_linux: released (2.6.31-22.67)
lucid_linux: released (2.6.32-25.45)
maverick_linux: not-affected
devel_linux: not-affected

Patches_linux-mvl-dove:
upstream_linux-mvl-dove: released (2.6.36~rc4)
dapper_linux-mvl-dove: DNE
hardy_linux-mvl-dove: DNE
karmic_linux-mvl-dove: ignored (abandonded branch)
lucid_linux-mvl-dove: released (2.6.32-216.33)
maverick_linux-mvl-dove: released (2.6.32-416.33)
devel_linux-mvl-dove: DNE

Patches_linux-ec2:
upstream_linux-ec2: released (2.6.36~rc4)
dapper_linux-ec2: DNE
hardy_linux-ec2: DNE
karmic_linux-ec2: released (2.6.31-307.21)
lucid_linux-ec2: released (2.6.32-309.18)
maverick_linux-ec2: ignored (binary supplied by "linux" now)
devel_linux-ec2: DNE

Patches_linux-fsl-imx51:
upstream_linux-fsl-imx51: released (2.6.36~rc4)
dapper_linux-fsl-imx51: DNE
hardy_linux-fsl-imx51: DNE
karmic_linux-fsl-imx51: released (2.6.31-112.30)
lucid_linux-fsl-imx51: released (2.6.31-608.22)
maverick_linux-fsl-imx51: DNE
devel_linux-fsl-imx51: DNE

Patches_linux-lts-backport-maverick:
upstream_linux-lts-backport-maverick: released (2.6.36~rc4)
dapper_linux-lts-backport-maverick: DNE
hardy_linux-lts-backport-maverick: DNE
karmic_linux-lts-backport-maverick: DNE
lucid_linux-lts-backport-maverick: released (2.6.35-25.44~lucid1)
maverick_linux-lts-backport-maverick: DNE
devel_linux-lts-backport-maverick: DNE

Patches_linux-ti-omap4:
upstream_linux-ti-omap4: released (2.6.36~rc4)
dapper_linux-ti-omap4: DNE
hardy_linux-ti-omap4: DNE
karmic_linux-ti-omap4: DNE
lucid_linux-ti-omap4: DNE
maverick_linux-ti-omap4: released (2.6.35-903.22)
devel_linux-ti-omap4: not-affected