← Back to team overview

kernel-packages team mailing list archive

[Bug 708839] Re: CVE-2010-3859

 

** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/708839

Title:
  CVE-2010-3859

Status in linux package in Ubuntu:
  Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux source package in Lucid:
  Fix Released
Status in linux-fsl-imx51 source package in Lucid:
  Fix Released
Status in linux source package in Maverick:
  Fix Released
Status in linux-fsl-imx51 source package in Maverick:
  Invalid
Status in linux source package in Natty:
  Fix Released
Status in linux-fsl-imx51 source package in Natty:
  Invalid
Status in linux source package in Dapper:
  Fix Released
Status in linux-fsl-imx51 source package in Dapper:
  Invalid
Status in linux source package in Hardy:
  Fix Released
Status in linux-fsl-imx51 source package in Hardy:
  Invalid
Status in linux source package in Karmic:
  Fix Released
Status in linux-fsl-imx51 source package in Karmic:
  Won't Fix

Bug description:
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3859

  The tipc_msg_build() function in net/tipc/msg.c contains an exploitable kernel
  heap overflow that would allow a local user to escalate privileges to root by
  issuing maliciously crafted sendmsg() calls via TIPC sockets.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/708839/+subscriptions