Unrated severityNVD Advisory· Published Oct 4, 2010· Updated Apr 29, 2026
CVE-2010-3442
CVE-2010-3442
Description
Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.
Affected products
21cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: <2.6.36
- cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
35- www.openwall.com/lists/oss-security/2010/09/29/2nvdMailing ListPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2010/09/29/3nvdMailing ListPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2010/09/29/4nvdMailing ListPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2010/09/29/9nvdMailing ListPatchThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.htmlnvdMailing ListThird Party Advisory
- secunia.com/advisories/42400nvdThird Party Advisory
- secunia.com/advisories/42745nvdThird Party Advisory
- secunia.com/advisories/42778nvdThird Party Advisory
- secunia.com/advisories/42789nvdThird Party Advisory
- secunia.com/advisories/42801nvdThird Party Advisory
- secunia.com/advisories/43291nvdThird Party Advisory
- secunia.com/advisories/46397nvdThird Party Advisory
- www.debian.org/security/2010/dsa-2126nvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0842.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0936.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0958.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2011-0004.htmlnvdThird Party Advisory
- www.securityfocus.com/archive/1/520102/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/43787nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-1000-1nvdThird Party Advisory
- www.vmware.com/security/advisories/VMSA-2011-0012.htmlnvdThird Party Advisory
- www.vupen.com/english/advisories/2010/3113nvdThird Party Advisory
- www.vupen.com/english/advisories/2010/3321nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0012nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0024nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0298nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0375nvdThird Party Advisory
- www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2nvdBroken Link
News mentions
0No linked articles in our index yet.