First published: Thu Sep 09 2010(Updated: )
Buffer overflow in the niu_get_ethtool_tcam_all function in drivers/net/niu.c in the Linux kernel before 2.6.36-rc4 allows local users to cause a denial of service or possibly have unspecified other impact via the ETHTOOL_GRXCLSRLALL ethtool command.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <=2.6.36 | |
Linux Kernel | =2.6.36-rc1 | |
Linux Kernel | =2.6.36-rc2 | |
Linux Kernel | =2.6.36-rc3 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =9.04 | |
Ubuntu Linux | =9.10 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =10.10 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =9.04 | |
Ubuntu | =9.10 | |
Ubuntu | =10.04 | |
Ubuntu | =10.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3084 has a high severity as it can lead to local denial of service and potentially other impacts.
To fix CVE-2010-3084, update the Linux kernel to version 2.6.36 or above, which patches the buffer overflow vulnerability.
CVE-2010-3084 affects Linux kernel versions prior to 2.6.36-rc4, including 2.6.36-rc1, 2.6.36-rc2, and 2.6.36-rc3.
CVE-2010-3084 is not typically exploitable remotely as it requires local user access to impact the system.
The vulnerability in CVE-2010-3084 is associated with the ETHTOOL_GRXCLSRLALL ethtool command, which triggers the buffer overflow.