TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2010-3442

N/A

Beschreibung

Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.

CVE Details

CVSS v3.1 BewertungN/A
Veroffentlicht10/4/2010
Zuletzt geandert4/29/2026
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoralinux:linux_kernelopensuse:opensusesuse:linux_enterprise_desktopsuse:linux_enterprise_real_time_extensionsuse:linux_enterprise_serversuse:linux_enterprise_software_development_kit

Schwachen (CWE)

CWE-190

Referenzen

http://secunia.com/advisories/42400(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/42745(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/42778(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/42789(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/42801(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/43291(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/46397(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2010/dsa-2126(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2010/09/29/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2010/09/29/3(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2010/09/29/4(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2010/09/29/9(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0842.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0936.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0958.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2011-0004.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/43787(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1000-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/3113(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/3321(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0012(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0024(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0298(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0375(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=638478(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.