CVE-2010-3858
Publication date 30 November 2010
Last updated 24 July 2024
Ubuntu priority
The setup_arg_pages function in fs/exec.c in the Linux kernel before 2.6.36, when CONFIG_STACK_GROWSDOWN is used, does not properly restrict the stack memory consumption of the (1) arguments and (2) environment for a 32-bit application on a 64-bit platform, which allows local users to cause a denial of service (system crash) via a crafted exec system call, a related issue to CVE-2010-2240.
From the Ubuntu Security Team
Brad Spengler discovered that stack memory for new a process was not correctly calculated. A local attacker could exploit this to crash the system, leading to a denial of service.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | 11.04 natty |
Not affected
|
10.10 maverick |
Fixed 2.6.35-24.42
|
|
10.04 LTS lucid |
Fixed 2.6.32-27.49
|
|
9.10 karmic |
Fixed 2.6.31-22.70
|
|
9.04 jaunty | Ignored end of life | |
8.04 LTS hardy |
Fixed 2.6.24-28.82
|
|
6.06 LTS dapper | Not in release | |
linux-ec2 | 11.04 natty | Not in release |
10.10 maverick | Ignored end of life | |
10.04 LTS lucid |
Fixed 2.6.32-311.22
|
|
9.10 karmic |
Fixed 2.6.31-307.23
|
|
9.04 jaunty | Not in release | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release | |
linux-fsl-imx51 | 11.04 natty | Not in release |
10.10 maverick | Not in release | |
10.04 LTS lucid |
Fixed 2.6.31-608.21
|
|
9.10 karmic |
Fixed 2.6.31-112.30
|
|
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release | |
linux-lts-backport-maverick | 11.04 natty | Not in release |
10.10 maverick | Not in release | |
10.04 LTS lucid |
Fixed 2.6.35-25.44~lucid1
|
|
9.10 karmic | Not in release | |
9.04 jaunty | Not in release | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release | |
linux-lts-backport-natty | 11.04 natty | Not in release |
10.10 maverick | Not in release | |
10.04 LTS lucid |
Not affected
|
|
8.04 LTS hardy | Not in release | |
linux-mvl-dove | 11.04 natty | Not in release |
10.10 maverick |
Fixed 2.6.32-414.30
|
|
10.04 LTS lucid |
Fixed 2.6.32-213.29
|
|
9.10 karmic | Ignored end of life | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release | |
linux-source-2.6.15 | 11.04 natty | Not in release |
10.10 maverick | Not in release | |
10.04 LTS lucid | Not in release | |
9.10 karmic | Not in release | |
9.04 jaunty | Not in release | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper |
Not affected
|
|
linux-ti-omap4 | 11.04 natty |
Not affected
|
10.10 maverick |
Fixed 2.6.35-903.23
|
|
10.04 LTS lucid | Not in release | |
9.10 karmic | Not in release | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release |
Patch details
References
Related Ubuntu Security Notices (USN)
- USN-1072-1
- Linux kernel vulnerabilities
- 25 February 2011
- USN-1202-1
- Linux kernel (OMAP4) vulnerabilities
- 13 September 2011
- USN-1083-1
- Linux kernel vulnerabilities
- 3 March 2011
- USN-1074-1
- Linux kernel vulnerabilities
- 25 February 2011
- USN-1041-1
- Linux kernel vulnerabilities
- 10 January 2011
- USN-1074-2
- Linux kernel vulnerabilities
- 28 February 2011
- USN-1093-1
- Linux Kernel vulnerabilities (Marvell Dove)
- 25 March 2011