kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #103806
[Bug 711341] Re: CVE-2010-3880
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/711341
Title:
CVE-2010-3880
Status in linux package in Ubuntu:
Fix Released
Status in linux-mvl-dove package in Ubuntu:
Invalid
Status in linux source package in Lucid:
Fix Released
Status in linux-mvl-dove source package in Lucid:
Fix Released
Status in linux source package in Maverick:
Fix Released
Status in linux-mvl-dove source package in Maverick:
Fix Released
Status in linux source package in Natty:
Fix Released
Status in linux-mvl-dove source package in Natty:
Invalid
Status in linux source package in Dapper:
Fix Released
Status in linux-mvl-dove source package in Dapper:
Invalid
Status in linux source package in Hardy:
Fix Released
Status in linux-mvl-dove source package in Hardy:
Invalid
Status in linux source package in Karmic:
Won't Fix
Status in linux-mvl-dove source package in Karmic:
Invalid
Bug description:
net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not
properly audit INET_DIAG bytecode, which allows local users to cause a
denial of service (kernel infinite loop) via crafted
INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains
multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP
instructions.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/711341/+subscriptions