CVE-2010-2492
Published: 20 July 2010
Buffer overflow in the ecryptfs_uid_hash macro in fs/ecryptfs/messaging.c in the eCryptfs subsystem in the Linux kernel before 2.6.35 might allow local users to gain privileges or cause a denial of service (system crash) via unspecified vectors.
From the Ubuntu Security Team
ecryptfs hashing bug
Priority
Status
Package | Release | Status |
---|---|---|
linux-source-2.6.15 Launchpad, Ubuntu, Debian |
upstream |
Not vulnerable
|
dapper |
Not vulnerable
|
|
hardy |
Does not exist
|
|
jaunty |
Does not exist
|
|
karmic |
Does not exist
|
|
lucid |
Does not exist
|
|
linux Launchpad, Ubuntu, Debian |
upstream |
Pending
|
dapper |
Does not exist
|
|
hardy |
Released
(2.6.24-28.73)
|
|
jaunty |
Released
(2.6.28-19.62)
|
|
karmic |
Released
(2.6.31-22.61)
|
|
lucid |
Released
(2.6.32-24.39)
|
|
Patches: hardy: http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-2492/patches/hardy/linux/0001-ecryptfs-Bugfix-for-error-related-to-ecryptfs_hash_buc.txt jaunty: http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-2492/patches/jaunty/linux/0001-ecryptfs-Bugfix-for-error-related-to-ecryptfs_hash_buc.txt karmic: http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-2492/patches/karmic/linux/0001-ecryptfs-Bugfix-for-error-related-to-ecryptfs_hash_buc.txt lucid: http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-2492/patches/lucid/linux/0001-ecryptfs-Bugfix-for-error-related-to-ecryptfs_hash_buc.txt |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |