CVE-2010-3067

Priority
Medium
Description
Integer overflow in the do_io_submit function in fs/aio.c in the Linux
kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial
of service or possibly have unspecified other impact via crafted use of the
io_submit system call.
Ubuntu-Description
Tavis Ormandy discovered that the AIO subsystem did not correctly validate
certain parameters. A local attacker could exploit this to crash the system
or possibly gain root privileges.
References
Assigned-to
sconklin
Package
Upstream:needs-triage
Patches:
Dapper:http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-3067/patches/dapper/linux/0001-aio-check-for-multiplication-overflow-in-do_io_submit.txt
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Source: linux (LP Ubuntu Debian)
Upstream:needs-triage
Patches:
Upstream:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=75e1c70fc31490ef8a373ea2a4bea2524099b478
Hardy:http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-3067/patches/hardy/linux/0001-aio-check-for-multiplication-overflow-in-do_io_submit.txt
Jaunty:http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-3067/patches/jaunty/linux/0001-aio-check-for-multiplication-overflow-in-do_io_submit.txt
Karmic:http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-3067/patches/karmic/linux/0001-aio-check-for-multiplication-overflow-in-do_io_submit.txt
Lucid:http://chinstrap.ubuntu.com/~sconklin/CVEs/CVE-2010-3067/patches/lucid/linux/0001-aio-check-for-multiplication-overflow-in-do_io_submit.txt
Package
Upstream:needs-triage
More Information

Valid XHTML 1.0 Strict

Updated: 2015-07-29 20:38:50 UTC (commit 9756)