CVE-2010-3848
Publication date 30 November 2010
Last updated 24 July 2024
Ubuntu priority
Stack-based buffer overflow in the econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to gain privileges by providing a large number of iovec structures.
From the Ubuntu Security Team
Nelson Elhage discovered several problems with the Acorn Econet protocol driver. A local user could cause a denial of service via a NULL pointer dereference, escalate privileges by overflowing the kernel stack, and assign Econet addresses to arbitrary interfaces.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-mvl-dove | ||
linux-source-2.6.15 | ||
linux-ti-omap4 | ||
Notes
jdstrand
per tracking bug LP: #712610, there was a regression in the kernel in -proposed for linux-mvl-dove. It it being investigated.
Patch details
Package | Patch details |
---|---|
linux |
References
Related Ubuntu Security Notices (USN)
- USN-1023-1
- Linux kernel vulnerabilities
- 30 November 2010
- USN-1083-1
- Linux kernel vulnerabilities
- 3 March 2011
- USN-1074-1
- Linux kernel vulnerabilities
- 25 February 2011
- USN-1119-1
- Linux kernel (OMAP4) vulnerabilities
- 20 April 2011
- USN-1074-2
- Linux kernel vulnerabilities
- 28 February 2011
- USN-1093-1
- Linux Kernel vulnerabilities (Marvell Dove)
- 25 March 2011