4.7

CVE-2010-3442

Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version < 2.6.36
LinuxLinux Kernel Version2.6.36 Update-
LinuxLinux Kernel Version2.6.36 Updaterc1
LinuxLinux Kernel Version2.6.36 Updaterc2
LinuxLinux Kernel Version2.6.36 Updaterc3
LinuxLinux Kernel Version2.6.36 Updaterc4
FedoraprojectFedora Version13
OpensuseOpensuse Version11.2
OpensuseOpensuse Version11.3
SuseLinux Enterprise Desktop Version10 Updatesp3
SuseLinux Enterprise Real Time Extension Version11 Updatesp1
SuseLinux Enterprise Server Version10 Updatesp3
DebianDebian Linux Version5.0
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version8.04 SwEdition-
CanonicalUbuntu Linux Version9.04
CanonicalUbuntu Linux Version9.10
CanonicalUbuntu Linux Version10.04 SwEdition-
CanonicalUbuntu Linux Version10.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.17% 0.352
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.7 3.4 6.9
AV:L/AC:M/Au:N/C:N/I:N/A:C
CWE-190 Integer Overflow or Wraparound

The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.

http://www.openwall.com/lists/oss-security/2010/09/29/2
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2010/09/29/3
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2010/09/29/4
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2010/09/29/9
Patch
Third Party Advisory
Mailing List
http://www.securityfocus.com/bid/43787
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=638478
Patch
Third Party Advisory
Issue Tracking