Unrated severityNVD Advisory· Published Dec 10, 2010· Updated Apr 29, 2026
CVE-2010-4157
CVE-2010-4157
Description
Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large argument in an ioctl call.
Affected products
11- cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
36- openwall.com/lists/oss-security/2010/11/09/1nvdMailing ListPatchThird Party Advisory
- openwall.com/lists/oss-security/2010/11/09/3nvdMailing ListPatchThird Party Advisory
- openwall.com/lists/oss-security/2010/11/10/12nvdMailing ListPatchThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- openwall.com/lists/oss-security/2010/11/09/4nvdExploitMailing ListPatchThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.htmlnvdMailing ListThird Party Advisory
- openwall.com/lists/oss-security/2010/11/09/5nvdMailing ListThird Party Advisory
- secunia.com/advisories/42745nvdThird Party Advisory
- secunia.com/advisories/42778nvdThird Party Advisory
- secunia.com/advisories/42789nvdThird Party Advisory
- secunia.com/advisories/42801nvdThird Party Advisory
- secunia.com/advisories/42932nvdThird Party Advisory
- secunia.com/advisories/42963nvdThird Party Advisory
- secunia.com/advisories/43291nvdThird Party Advisory
- secunia.com/advisories/46397nvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0958.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2011-0004.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2011-0162.htmlnvdThird Party Advisory
- www.securityfocus.com/archive/1/520102/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/44648nvdThird Party AdvisoryVDB Entry
- www.vmware.com/security/advisories/VMSA-2011-0012.htmlnvdThird Party Advisory
- www.vupen.com/english/advisories/2010/3321nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0012nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0024nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0124nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0168nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0298nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0375nvdThird Party Advisory
- ns3.spinics.net/lists/linux-scsi/msg47361.htmlnvdBroken Link
- www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.1nvdBroken Link
News mentions
0No linked articles in our index yet.