First published: Wed Sep 29 2010(Updated: )
Description of problem: The snd_ctl_new() function in sound/core/control.c allocates space for a snd_kcontrol struct by performing arithmetic operations on a user-provided size without checking for integer overflow. If a user provides a large enough size, an overflow will occur, the allocated chunk will be too small, and a second user-influenced value will be written repeatedly past the bounds of this chunk. This code is reachable by unprivileged users who have permission to open a /dev/snd/controlC* device (on many distros, this is group "audio") via the SNDRV_CTL_IOCTL_ELEM_ADD and SNDRV_CTL_IOCTL_ELEM_REPLACE ioctls. Upstream commit: <a href="http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git;a=commitdiff;h=5591bf07225523600450edd9e6ad258bb877b779">http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git;a=commitdiff;h=5591bf07225523600450edd9e6ad258bb877b779</a> Acknowledgements: Red Hat would like to thank Dan Rosenberg for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <2.6.36 | |
Linux Kernel | =2.6.36 | |
Linux Kernel | =2.6.36-rc1 | |
Linux Kernel | =2.6.36-rc2 | |
Linux Kernel | =2.6.36-rc3 | |
Linux Kernel | =2.6.36-rc4 | |
Fedora | =13 | |
SUSE Linux | =11.2 | |
SUSE Linux | =11.3 | |
SUSE Linux Enterprise Desktop | =10-sp3 | |
SUSE Linux Enterprise Real Time Extension | =11-sp1 | |
SUSE Linux Enterprise Server | =9 | |
SUSE Linux Enterprise Server | =10-sp3 | |
SUSE Linux Enterprise Software Development Kit | =10-sp3 | |
Debian | =5.0 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =9.04 | |
Ubuntu | =9.10 | |
Ubuntu | =10.04 | |
Ubuntu | =10.10 | |
debian/linux-2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3442 has a medium severity rating due to potential memory corruption vulnerabilities that could affect system stability.
To fix CVE-2010-3442, you should update your Linux kernel to a version that is patched for this vulnerability.
CVE-2010-3442 affects various Linux distributions, including certain versions of Debian, Ubuntu, Fedora, and openSUSE.
Exploiting CVE-2010-3442 could lead to a denial of service or potentially allow an attacker to execute arbitrary code on the affected system.
CVE-2010-3442 was disclosed in 2010 and affects some releases of the Linux kernel up to version 2.6.36.