~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
PublicDateAtUSN: 2010-09-15
Candidate: CVE-2010-3081
PublicDate: 2010-09-24
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081
 http://www.ubuntu.com/usn/usn-988-1
 http://www.ubuntu.com/usn/usn-1074-1
 http://www.ubuntu.com/usn/usn-1074-2
 http://www.ubuntu.com/usn/usn-1119-1
Description:
 The compat_alloc_user_space functions in include/asm/compat.h files in the
 Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly
 allocate the userspace memory required for the 32-bit compatibility layer,
 which allows local users to gain privileges by leveraging the ability of
 the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt
 support) to control a certain length value, related to a "stack pointer
 underflow" issue, as exploited in the wild in September 2010.
Ubuntu-Description:
 Ben Hawkes discovered that the Linux kernel did not correctly validate
 memory ranges on 64bit kernels when allocating memory on behalf of 32bit
 system calls. On a 64bit system, a local attacker could perform malicious
 multicast getsockopt calls to gain root privileges.
Notes:
Bugs:
Priority: high
Discovered-by: Ben Hawkes
Assigned-to: smb

Patches_linux-source-2.6.15:
 dapper: http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-3081/patches/dapper/linux/0001-compat-Make-compat_alloc_user_space-incorporate-the-ac.txt
upstream_linux-source-2.6.15: released (2.6.36~rc5)
dapper_linux-source-2.6.15: released (2.6.15-55.88)
hardy_linux-source-2.6.15: DNE
jaunty_linux-source-2.6.15: DNE
karmic_linux-source-2.6.15: DNE
lucid_linux-source-2.6.15: DNE
maverick_linux-source-2.6.15: DNE
devel_linux-source-2.6.15: DNE

Patches_linux:
 upstream: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=c41d68a513c71e35a14f66d71782d27a79a81ea6
 hardy: http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-3081/patches/hardy/linux/0001-compat-Make-compat_alloc_user_space-incorporate-the-ac.txt
 jaunty: http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-3081/patches/jaunty/linux/0001-compat-Make-compat_alloc_user_space-incorporate-the-ac.txt
 karmic: http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-3081/patches/karmic/linux/0001-compat-Make-compat_alloc_user_space-incorporate-the-ac.txt
 lucid: http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-3081/patches/lucid/linux/0001-compat-Make-compat_alloc_user_space-incorporate-the-ac.txt
upstream_linux: released (2.6.36~rc5)
dapper_linux: DNE
hardy_linux: released (2.6.24-28.79)
jaunty_linux: released (2.6.28-19.65)
karmic_linux: released (2.6.31-22.65)
lucid_linux: released (2.6.32-24.43)
maverick_linux: released (2.6.35-22.32)
devel_linux: not-affected

Patches_linux-fsl-imx51:
upstream_linux-fsl-imx51: released (2.6.36~rc5)
dapper_linux-fsl-imx51: DNE
hardy_linux-fsl-imx51: DNE
karmic_linux-fsl-imx51: released (2.6.31-112.30)
lucid_linux-fsl-imx51: released (2.6.31-608.22)
maverick_linux-fsl-imx51: DNE
devel_linux-fsl-imx51: DNE

Patches_linux-ti-omap4:
upstream_linux-ti-omap4: released (2.6.36~rc5)
dapper_linux-ti-omap4: DNE
hardy_linux-ti-omap4: DNE
karmic_linux-ti-omap4: DNE
lucid_linux-ti-omap4: DNE
maverick_linux-ti-omap4: released (2.6.35-903.22)
devel_linux-ti-omap4: not-affected