CVE-2008-2729
Publication date 30 June 2008
Last updated 24 July 2024
Ubuntu priority
arch/x86_64/lib/copy_user.S in the Linux kernel before 2.6.19 on some AMD64 systems does not erase destination memory locations after an exception during kernel memory copy, which allows local users to obtain sensitive information.
From the Ubuntu Security Team
The copy_to_user routine in the kernel did not correctly clear memory destination addresses when running on 64bit kernels. A local attacker could exploit this to gain access to sensitive kernel memory, leading to a loss of privacy.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-source-2.6.15 | ||
linux-source-2.6.17 | ||
linux-source-2.6.20 | ||
linux-source-2.6.22 | ||
Notes
Patch details
Package | Patch details |
---|---|
linux |