CVE-2010-4565
Publication date 29 December 2010
Last updated 24 July 2024
Ubuntu priority
The bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel 2.6.36 and earlier creates a publicly accessible file with a filename containing a kernel memory address, which allows local users to obtain potentially sensitive information about kernel memory use by listing this filename.
From the Ubuntu Security Team
Dan Rosenburg discovered that the CAN subsystem leaked kernel addresses into the /proc filesystem. A local attacker could use this to increase the chances of a successful memory corruption exploit.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-lts-backport-natty | ||
linux-mvl-dove | ||
linux-source-2.6.15 | ||
linux-ti-omap4 | ||
Patch details
Package | Patch details |
---|---|
linux |
References
Related Ubuntu Security Notices (USN)
- USN-1164-1
- Linux kernel vulnerabilities (i.MX51)
- 6 July 2011
- USN-1202-1
- Linux kernel (OMAP4) vulnerabilities
- 13 September 2011
- USN-1160-1
- Linux kernel vulnerabilities
- 28 June 2011
- USN-1141-1
- Linux kernel vulnerabilities
- 1 June 2011
- USN-1162-1
- Linux kernel vulnerabilities (Marvell Dove)
- 29 June 2011
- USN-1187-1
- Linux kernel (Maverick backport) vulnerabilities
- 9 August 2011
- USN-1159-1
- Linux kernel vulnerabilities (Marvell Dove)
- 13 July 2011