CVE-2010-3442
Publication date 4 October 2010
Last updated 24 July 2024
Ubuntu priority
Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.
From the Ubuntu Security Team
Dan Rosenberg discovered that the Sound subsystem did not correctly validate parameters. A local attacker could exploit this to crash the system, leading to a denial of service.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-mvl-dove | ||
linux-source-2.6.15 | ||
Patch details
References
Related Ubuntu Security Notices (USN)
- USN-1083-1
- Linux kernel vulnerabilities
- 3 March 2011
- USN-1074-1
- Linux kernel vulnerabilities
- 25 February 2011
- USN-1000-1
- Linux kernel vulnerabilities
- 19 October 2010
- USN-1074-2
- Linux kernel vulnerabilities
- 28 February 2011
- USN-1093-1
- Linux Kernel vulnerabilities (Marvell Dove)
- 25 March 2011