UBUNTU-CVE-2010-3192

Source
https://ubuntu.com/security/CVE-2010-3192
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2010/UBUNTU-CVE-2010-3192.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2010-3192
Upstream
  • CVE-2010-3192
Published
2010-10-14T05:58:00Z
Modified
2026-02-03T07:09:56.418021Z
Severity
  • Ubuntu - negligible
Summary
[none]
Details

Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortifyfail function in debug/fortifyfail.c, and the __stackchkfail (aka stack protection) and __chkfail (aka FORTIFYSOURCE) implementations.

References

Affected packages

Ubuntu:Pro:14.04:LTS / eglibc

Package

Name
eglibc
Purl
pkg:deb/ubuntu/eglibc@2.19-0ubuntu6.15+esm4?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.17-93ubuntu4
2.18-0ubuntu1
2.18-0ubuntu2
2.18-0ubuntu4
2.18-0ubuntu5
2.18-0ubuntu6
2.18-0ubuntu7
2.19-0ubuntu2
2.19-0ubuntu3
2.19-0ubuntu4
2.19-0ubuntu5
2.19-0ubuntu6
2.19-0ubuntu6.1
2.19-0ubuntu6.3
2.19-0ubuntu6.4
2.19-0ubuntu6.5
2.19-0ubuntu6.6
2.19-0ubuntu6.7
2.19-0ubuntu6.8
2.19-0ubuntu6.9
2.19-0ubuntu6.10
2.19-0ubuntu6.11
2.19-0ubuntu6.13
2.19-0ubuntu6.14
2.19-0ubuntu6.15
2.19-0ubuntu6.15+esm1
2.19-0ubuntu6.15+esm2
2.19-0ubuntu6.15+esm3
2.19-0ubuntu6.15+esm4

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "eglibc-source"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "libc-bin"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "libc-dev-bin"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "libc6"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "libc6-amd64"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "libc6-armel"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "libc6-dev"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "libc6-dev-amd64"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "libc6-dev-armel"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "libc6-dev-i386"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "libc6-dev-x32"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "libc6-i386"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "libc6-pic"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "libc6-prof"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "libc6-x32"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "multiarch-support"
        },
        {
            "binary_version": "2.19-0ubuntu6.15+esm4",
            "binary_name": "nscd"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2010/UBUNTU-CVE-2010-3192.json"

Ubuntu:Pro:16.04:LTS / glibc

Package

Name
glibc
Purl
pkg:deb/ubuntu/glibc@2.23-0ubuntu11.3+esm9?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.21-0ubuntu4
2.21-0ubuntu5
2.21-0ubuntu6
2.23-0ubuntu1
2.23-0ubuntu2
2.23-0ubuntu3
2.23-0ubuntu4
2.23-0ubuntu5
2.23-0ubuntu6
2.23-0ubuntu7
2.23-0ubuntu9
2.23-0ubuntu10
2.23-0ubuntu11
2.23-0ubuntu11.2
2.23-0ubuntu11.3
2.23-0ubuntu11.3+esm1
2.23-0ubuntu11.3+esm2
2.23-0ubuntu11.3+esm3
2.23-0ubuntu11.3+esm5
2.23-0ubuntu11.3+esm6
2.23-0ubuntu11.3+esm7
2.23-0ubuntu11.3+esm8
2.23-0ubuntu11.3+esm9

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "glibc-source"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "libc-bin"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "libc-dev-bin"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "libc6"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "libc6-amd64"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "libc6-armel"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "libc6-dev"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "libc6-dev-amd64"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "libc6-dev-armel"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "libc6-dev-i386"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "libc6-dev-s390"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "libc6-dev-x32"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "libc6-i386"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "libc6-pic"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "libc6-s390"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "libc6-x32"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "locales"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "locales-all"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "multiarch-support"
        },
        {
            "binary_version": "2.23-0ubuntu11.3+esm9",
            "binary_name": "nscd"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2010/UBUNTU-CVE-2010-3192.json"