Oval Definition:oval:com.ubuntu.trusty:def:20102955000
Revision Date:2010-09-08Version:1
Title:CVE-2010-2955 on Ubuntu 14.04 LTS (trusty) - low.
Description:The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size. Brad Spengler discovered that the wireless extensions did not correctly validate certain request sizes. A local attacker could exploit this to read portions of kernel memory, leading to a loss of privacy.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2010-2955
Platform(s):Ubuntu 14.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 14.04 LTS (trusty) is installed.
  • AND Package Information
  • NOT While related to the CVE in some way, the 'linux' package in trusty is not affected (note: '3.11.0-12.19').
  • OR NOT While related to the CVE in some way, the 'linux-flo' package in trusty is not affected (note: '3.4.0-1.3').
  • OR NOT While related to the CVE in some way, the 'linux-goldfish' package in trusty is not affected (note: '3.4.0-1.9').
  • OR NOT While related to the CVE in some way, the 'linux-grouper' package in trusty is not affected (note: '3.1.10-8.28').
  • OR NOT While related to the CVE in some way, the 'linux-lts-utopic' package in trusty is not affected (note: '3.16.0-25.33~14.04.2').
  • OR NOT While related to the CVE in some way, the 'linux-lts-vivid' package in trusty is not affected (note: '3.19.0-18.18~14.04.1').
  • OR NOT While related to the CVE in some way, the 'linux-maguro' package in trusty is not affected (note: '3.0.0-3.18').
  • OR NOT While related to the CVE in some way, the 'linux-mako' package in trusty is not affected (note: '3.4.0-3.21').
  • OR NOT While related to the CVE in some way, the 'linux-manta' package in trusty is not affected (note: '3.4.0-4.19').
  • BACK