CVE-2010-3881
Publication date 23 December 2010
Last updated 24 July 2024
Ubuntu priority
arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.
From the Ubuntu Security Team
Vasiliy Kulikov discovered that kvm did not correctly clear memory. A local attacker could exploit this to read portions of the kernel stack, leading to a loss of privacy.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-lts-backport-natty | ||
linux-mvl-dove | ||
linux-source-2.6.15 | ||
linux-ti-omap4 | ||
Notes
smb
Releases before Lucid do not contain the IOCTL functions affected. For ti-omap, mvl-dove and ec2 the change of KVM should not matter at all.
References
Related Ubuntu Security Notices (USN)
- USN-1054-1
- Linux kernel vulnerabilities
- 1 February 2011
- USN-1187-1
- Linux kernel (Maverick backport) vulnerabilities
- 9 August 2011
- USN-1119-1
- Linux kernel (OMAP4) vulnerabilities
- 20 April 2011
- USN-1161-1
- Linux kernel vulnerabilities (EC2)
- 13 July 2011
- USN-1093-1
- Linux Kernel vulnerabilities (Marvell Dove)
- 25 March 2011