Release date:
Updated on:
Affected Systems:
Linux kernel 2.6.x
Description:
--------------------------------------------------------------------------------
Bugtraq id: 44354
Cve id: CVE-2010-3859
Linux Kernel is the Kernel used by open source Linux.
Linux Kernel net/tipc/msg. the tipc_msg_build () function in the c file has the Kernel Heap Overflow Vulnerability. Local users can use the TIPC socket to publish a specially crafted sendmsg () call to trigger this overflow, resulting in arbitrary kernel state code execution.
<* Source: Petr Matousek
Link: https://bugzilla.redhat.com/show_bug.cgi? Format = multiple & amp; id = 645867
Http://marc.info /? L = linux-netdev & m = 128770476511716 & w = 2
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Linux
-----
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.kernel.org/