kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #103814
[Bug 708839] Re: CVE-2010-3859
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-4249
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/708839
Title:
CVE-2010-3859
Status in linux package in Ubuntu:
Fix Released
Status in linux-fsl-imx51 package in Ubuntu:
Invalid
Status in linux source package in Lucid:
Fix Released
Status in linux-fsl-imx51 source package in Lucid:
Fix Released
Status in linux source package in Maverick:
Fix Released
Status in linux-fsl-imx51 source package in Maverick:
Invalid
Status in linux source package in Natty:
Fix Released
Status in linux-fsl-imx51 source package in Natty:
Invalid
Status in linux source package in Dapper:
Fix Released
Status in linux-fsl-imx51 source package in Dapper:
Invalid
Status in linux source package in Hardy:
Fix Released
Status in linux-fsl-imx51 source package in Hardy:
Invalid
Status in linux source package in Karmic:
Fix Released
Status in linux-fsl-imx51 source package in Karmic:
Won't Fix
Bug description:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3859
The tipc_msg_build() function in net/tipc/msg.c contains an exploitable kernel
heap overflow that would allow a local user to escalate privileges to root by
issuing maliciously crafted sendmsg() calls via TIPC sockets.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/708839/+subscriptions