CVE-2010-3859
Publication date 29 December 2010
Last updated 24 July 2024
Ubuntu priority
Multiple integer signedness errors in the TIPC implementation in the Linux kernel before 2.6.36.2 allow local users to gain privileges via a crafted sendmsg call that triggers a heap-based buffer overflow, related to the tipc_msg_build function in net/tipc/msg.c and the verify_iovec function in net/core/iovec.c.
From the Ubuntu Security Team
Dan Rosenberg discovered that the Linux kernel TIPC implementation contained multiple integer signedness errors. A local attacker could exploit this to gain root privileges.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-lts-backport-natty | ||
linux-mvl-dove | ||
linux-source-2.6.15 | ||
linux-ti-omap4 | ||
Notes
kees
Upstream commits 8acfe468b0384e834a303f08ebc4953d72fb690a and 253eacc070b114c2ec1f81b067d2fed7305467b0
Patch details
Package | Patch details |
---|---|
linux |
References
Related Ubuntu Security Notices (USN)
- USN-1073-1
- Linux kernel vulnerabilities
- 25 February 2011
- USN-1072-1
- Linux kernel vulnerabilities
- 25 February 2011
- USN-1202-1
- Linux kernel (OMAP4) vulnerabilities
- 13 September 2011
- USN-1083-1
- Linux kernel vulnerabilities
- 3 March 2011
- USN-1054-1
- Linux kernel vulnerabilities
- 1 February 2011
- USN-1204-1
- Linux kernel (i.MX51) vulnerabilities
- 13 September 2011
- USN-1071-1
- Linux kernel vulnerabilities
- 25 February 2011
- USN-1093-1
- Linux Kernel vulnerabilities (Marvell Dove)
- 25 March 2011