Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:13949
[Eng]
Version
13
Class
patch
ALTXid
27382
Language
Russian
Severity
High
Title
Обновление USN-1119-1 -- уязвимости linux-ti-omap4
Description
linux-ti-omap4: Linux kernel for OMAP4 devices Multiple security flaws have been fixed in the OMAP4 port of the Linux kernel.
Family
unix
Platform
Ubuntu 10.10
Product
linux-ti-omap4
Reference
VENDOR: USN-1119-1
VENDOR: USN-1119-1
Id:
USN-1119-1
Reference:
https://usn.ubuntu.com/usn/usn-1119-1
CVE: CVE-2010-3873
CVE: CVE-2010-3873
Id:
CVE-2010-3873
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873
Comment
: The X.25 implementation in the Linux kernel before 2.6.36.2 does not properly parse facilities, which allows remote attackers to cause a denial of service (heap memory corruption and panic) or possibly have unspecified other impact via malformed (1) X25_FAC_CALLING_AE or (2) X25_FAC_CALLED_AE data, related to net/x25/x25_facilities.c and net/x25/x25_in.c, a different vulnerability than CVE-2010-4164.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
[oss-security] 20101104 Re: CVE request: X.25 remote DoS (MLIST)
[oss-security] 20101103 CVE request: X.25 remote DoS (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=649693 (CONFIRM)
[netdev] 20101102 [SECURITY] memory corruption in X.25 facilities parsing (MLIST)
[netdev] 20101104 Re: [SECURITY] memory corruption in X.25 facilities parsing (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
DSA-2126 (DEBIAN)
ADV-2011-0375 (VUPEN)
43291 (SECUNIA)
SUSE-SA:2011:008 (SUSE)
MDVSA-2011:029 (MANDRIVA)
openSUSE-SU-2013:0925 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a6331d6f9a4298173b413cf99a40cc86a9d92c37 (MISC)
CVE: CVE-2010-4529
CVE: CVE-2010-4529
Id:
CVE-2010-4529
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4529
Comment
: Integer underflow in the irda_getsockopt function in net/irda/af_irda.c in the Linux kernel before 2.6.37 on platforms other than x86 allows local users to obtain potentially sensitive information from kernel heap memory via an IRLMP_ENUMDEVICES getsockopt call.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
191 (Integer Underflow (Wrap or Wraparound))
References:
[oss-security] 20110103 Re: CVE request: kernel: irda: prevent integer underflow in IRLMP_ENUMDEVICES (MLIST)
42684 (SECUNIA)
[oss-security] 20101223 CVE request: kernel: irda: prevent integer underflow in IRLMP_ENUMDEVICES (MLIST)
[netdev] 20101222 [PATCH] irda: prevent integer underflow in IRLMP_ENUMDEVICES (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 (CONFIRM)
45556 (BID)
SUSE-SA:2011:008 (SUSE)
43291 (SECUNIA)
ADV-2011-0375 (VUPEN)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fdac1e0697356ac212259f2147aa60c72e334861 ()
CVE: CVE-2010-4527
CVE: CVE-2010-4527
Id:
CVE-2010-4527
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4527
Comment
: The load_mixer_volumes function in sound/oss/soundcard.c in the OSS sound subsystem in the Linux kernel before 2.6.37 incorrectly expects that a certain name field ends with a '\0' character, which allows local users to conduct buffer overflow attacks and gain privileges, or possibly obtain sensitive information from kernel memory, via a SOUND_MIXER_SETLEVELS ioctl call.
CVSSv2 Score:
6.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
[oss-security] 20101230 CVE request: kernel: buffer overflow in OSS load_mixer_volumes (MLIST)
45629 (BID)
https://bugzilla.redhat.com/show_bug.cgi?id=667615 (CONFIRM)
http://xorl.wordpress.com/2011/01/09/cve-2010-4527-linux-kernel-oss-sound-card-driver-buffer-overflow/ (MISC)
[oss-security] 20101231 Re: CVE request: kernel: buffer overflow in OSS load_mixer_volumes (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 (CONFIRM)
42765 (SECUNIA)
SUSE-SA:2011:008 (SUSE)
43291 (SECUNIA)
ADV-2011-0375 (VUPEN)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d81a12bc29ae4038770e05dce4ab7f26fd5880fb (MISC)
CVE: CVE-2010-4346
CVE: CVE-2010-4346
Id:
CVE-2010-4346
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4346
Comment
: The install_special_mapping function in mm/mmap.c in the Linux kernel before 2.6.37-rc6 does not make an expected security_file_mmap function call, which allows local users to bypass intended mmap_min_addr restrictions and possibly conduct NULL pointer dereference attacks via a crafted assembly-language application.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
CWE:
476 (NULL Pointer Dereference)
References:
[oss-security] 20101209 [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.] (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6 (CONFIRM)
42570 (SECUNIA)
[oss-security] 20101210 Re: Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check (MLIST)
[linux-kernel] 20101209 [PATCH] install_special_mapping skips security_file_mmap check. (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=662189 (CONFIRM)
[oss-security] 20101210 Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check (MLIST)
[oss-security] 20101209 Re: [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.] (MLIST)
45323 (BID)
MDVSA-2011:029 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050 (MISC)
CVE: CVE-2010-4342
CVE: CVE-2010-4342
Id:
CVE-2010-4342
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4342
Comment
: The aun_incoming function in net/econet/af_econet.c in the Linux kernel before 2.6.37-rc6, when Econet is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending an Acorn Universal Networking (AUN) packet over UDP.
CVSSv2 Score:
7.1
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C
CWE:
476 (NULL Pointer Dereference)
References:
[oss-security] 20101208 CVE request: kernel: NULL pointer dereference in AF_ECONET (MLIST)
[oss-security] 20101209 Re: CVE request: kernel: NULL pointer dereference in AF_ECONET (MLIST)
[netdev] 20101209 NULL dereference in econet AUN-over-UDP receive (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc6 (CONFIRM)
[netdev] 20101209 Re: NULL dereference in econet AUN-over-UDP receive (MLIST)
45321 (BID)
ADV-2011-0375 (VUPEN)
43291 (SECUNIA)
SUSE-SA:2011:008 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e085e76cbe558b79b54cbab772f61185879bc64 (MISC)
CVE: CVE-2010-4258
CVE: CVE-2010-4258
Id:
CVE-2010-4258
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4258
Comment
: The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
CVSSv2 Score:
6.2
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:C/I:C/A:C
CWE:
269 (Improper Privilege Management)
References:
[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses (MLIST)
[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses (MLIST)
[oss-security] 20101202 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses (MLIST)
20101207 Linux kernel exploit (FULLDISC)
[oss-security] 20101202 CVE request: kernel: failure to revert address limit override in OOPS error path (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=659567 (CONFIRM)
[linux-kernel] 20101201 [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS. (MLIST)
http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/ (MISC)
[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses (MLIST)
[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses (MLIST)
[oss-security] 20101202 Re: CVE request: kernel: failure to revert address limit override in OOPS error path (MLIST)
[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses (MLIST)
[linux-kernel] 20101201 Re: [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS. (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
[oss-security] 20101202 kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses (MLIST)
FEDORA-2010-18983 (FEDORA)
42745 (SECUNIA)
ADV-2010-3321 (VUPEN)
SUSE-SA:2011:002 (SUSE)
SUSE-SA:2011:001 (SUSE)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
42801 (SECUNIA)
42932 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
ADV-2011-0213 (VUPEN)
SUSE-SA:2011:005 (SUSE)
43056 (SECUNIA)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:008 (SUSE)
43291 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
MDVSA-2011:029 (MANDRIVA)
http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html (CONFIRM)
http://code.google.com/p/chromium-os/issues/detail?id=10234 (CONFIRM)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177 (MISC)
CVE: CVE-2010-4249
CVE: CVE-2010-4249
Id:
CVE-2010-4249
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4249
Comment
: The wait_for_unix_gc function in net/unix/garbage.c in the Linux kernel before 2.6.37-rc3-next-20101125 does not properly select times for garbage collection of inflight sockets, which allows local users to cause a denial of service (system hang) via crafted use of the socketpair and sendmsg system calls for SOCK_SEQPACKET sockets.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
400 (Uncontrolled Resource Consumption ('Resource Exhaustion'))
References:
[oss-security] 20101124 CVE request: kernel: unix socket local dos (MLIST)
[oss-security] 20101124 Re: CVE request: kernel: unix socket local dos (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.37-rc3-next-20101125.bz2 (CONFIRM)
[netdev] 20101124 [PATCH] af_unix: limit unix_tot_inflight (MLIST)
45037 (BID)
[linux-kernel] 20101124 [PATCH net-next-2.6] scm: lower SCM_MAX_FD (MLIST)
[linux-kernel] 20101125 Simple kernel attack using socketpair. easy, 100% reproductiblle, works under guest. no way to protect :( (MLIST)
15622 (EXPLOIT-DB)
https://bugzilla.redhat.com/show_bug.cgi?id=656756 (CONFIRM)
[linux-kernel] 20101123 Unix socket local DOS (OOM) (MLIST)
42354 (SECUNIA)
FEDORA-2010-18983 (FEDORA)
ADV-2010-3321 (VUPEN)
42745 (SECUNIA)
RHSA-2011:0162 (REDHAT)
42963 (SECUNIA)
ADV-2011-0168 (VUPEN)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=9915672d41273f5b77f1b3c29b391ffb7732b84b (MISC)
CVE: CVE-2010-4165
CVE: CVE-2010-4165
Id:
CVE-2010-4165
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4165
Comment
: The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
369 (Divide By Zero)
References:
[netdev] 20101110 possible kernel oops from user MSS (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=652508 (CONFIRM)
69241 (OSVDB)
[oss-security] 20101112 CVE request: kernel: possible kernel oops from user MSS (MLIST)
[oss-security] 20101112 Re: CVE request: kernel: possible kernel oops from user MSS (MLIST)
[netdev] 20101110 Re: possible kernel oops from user MSS (MLIST)
SUSE-SA:2011:002 (SUSE)
SUSE-SA:2011:001 (SUSE)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
42801 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
44830 (BID)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
MDVSA-2011:029 (MANDRIVA)
MDVSA-2011:051 (MANDRIVA)
8123 (SREASON)
8111 (SREASON)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7a1abd08d52fdeddb3e9a5a33f2f15cc6a5674d2 (MISC)
CVE: CVE-2010-4164
CVE: CVE-2010-4164
Id:
CVE-2010-4164
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164
Comment
: Multiple integer underflows in the x25_parse_facilities function in net/x25/x25_facilities.c in the Linux kernel before 2.6.36.2 allow remote attackers to cause a denial of service (system crash) via malformed X.25 (1) X25_FAC_CLASS_A, (2) X25_FAC_CLASS_B, (3) X25_FAC_CLASS_C, or (4) X25_FAC_CLASS_D facility data, a different vulnerability than CVE-2010-3873.
CVSSv2 Score:
7.8
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CWE:
191 (Integer Underflow (Wrap or Wraparound))
References:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
[oss-security] 20101112 Re: CVE request: kernel: remote DoS in X.25 (MLIST)
[netdev] 20101111 [SECURITY] [PATCH] Prevent crashing when parsing bad X.25 (MLIST)
[oss-security] 20101111 CVE request: kernel: remote DoS in X.25 (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=652517 (CONFIRM)
DSA-2126 (DEBIAN)
SUSE-SA:2011:001 (SUSE)
SUSE-SA:2011:002 (SUSE)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
42801 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
45055 (BID)
42932 (SECUNIA)
ADV-2011-0124 (VUPEN)
SUSE-SA:2011:004 (SUSE)
43291 (SECUNIA)
ADV-2011-0298 (VUPEN)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:007 (SUSE)
SUSE-SA:2011:008 (SUSE)
MDVSA-2011:029 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5ef41308f94dcbb3b7afc56cdef1c2ba53fa5d2f (MISC)
CVE: CVE-2010-4158
CVE: CVE-2010-4158
Id:
CVE-2010-4158
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4158
Comment
: The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
20101118 Re: Kernel 0-day (BUGTRAQ)
20101109 Kernel 0-day (BUGTRAQ)
44758 (BID)
https://bugzilla.redhat.com/show_bug.cgi?id=651698 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
[netdev] 20101109 [PATCH] Prevent reading uninitialized memory with socket filters (MLIST)
20101109 Kernel 0-day (FULLDISC)
42745 (SECUNIA)
ADV-2010-3321 (VUPEN)
FEDORA-2010-18983 (FEDORA)
SUSE-SA:2011:002 (SUSE)
RHSA-2010:0958 (REDHAT)
SUSE-SA:2011:001 (SUSE)
42801 (SECUNIA)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
42932 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
RHSA-2011:0162 (REDHAT)
42963 (SECUNIA)
ADV-2011-0168 (VUPEN)
42884 (SECUNIA)
RHSA-2011:0007 (REDHAT)
RHSA-2011:0017 (REDHAT)
42890 (SECUNIA)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:008 (SUSE)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
43291 (SECUNIA)
MDVSA-2011:029 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb (MISC)
CVE: CVE-2010-4079
CVE: CVE-2010-4079
Id:
CVE-2010-4079
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4079
Comment
: The ivtvfb_ioctl function in drivers/media/video/ivtv/ivtvfb.c in the Linux kernel before 2.6.36-rc8 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FBIOGET_VBLANK ioctl call.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=648666 (CONFIRM)
[linux-kernel] 20100915 [PATCH] drivers/media/video/ivtv/ivtvfb.c: prevent reading uninitialized stack memory (MLIST)
[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc8 (CONFIRM)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
45062 (BID)
DSA-2126 (DEBIAN)
RHSA-2010:0958 (REDHAT)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=405707985594169cfd0b1d97d29fcb4b4c6f2ac9 ()
CVE: CVE-2010-4072
CVE: CVE-2010-4072
Id:
CVE-2010-4072
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4072
Comment
: The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1 (CONFIRM)
[linux-kernel] 20101006 [PATCH] ipc: initialize structure memory to zero for shmctl (MLIST)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=648656 (CONFIRM)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
45054 (BID)
SUSE-SA:2011:001 (SUSE)
DSA-2126 (DEBIAN)
RHSA-2010:0958 (REDHAT)
42778 (SECUNIA)
ADV-2011-0070 (VUPEN)
USN-1041-1 (UBUNTU)
ADV-2011-0012 (VUPEN)
42758 (SECUNIA)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
SUSE-SA:2011:004 (SUSE)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
RHSA-2011:0017 (REDHAT)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
42884 (SECUNIA)
ADV-2011-0280 (VUPEN)
43161 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
SUSE-SA:2011:008 (SUSE)
USN-1057-1 (UBUNTU)
43291 (SECUNIA)
ADV-2011-0375 (VUPEN)
MDVSA-2011:029 (MANDRIVA)
MDVSA-2011:051 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3af54c9bd9e6f14f896aac1bb0e8405ae0bc7a44 ()
CVE: CVE-2010-3881
CVE: CVE-2010-3881
Id:
CVE-2010-3881
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3881
Comment
: arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
[kvm] 20101030 [patch v2] x86: kvm: x86: fix information leak to userland (MLIST)
ADV-2010-3287 (VUPEN)
https://bugzilla.redhat.com/show_bug.cgi?id=649920 (CONFIRM)
[oss-security] 20101104 CVE request: kernel: kvm kernel stack leakage (MLIST)
[oss-security] 20101105 Re: CVE request: kernel: kvm kernel stack leakage (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
1024912 (SECTRACK)
RHSA-2010:0998 (REDHAT)
44666 (BID)
SUSE-SA:2011:004 (SUSE)
42932 (SECUNIA)
ADV-2011-0124 (VUPEN)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
http://git.kernel.org/?p=virt/kvm/kvm.git%3Ba=commit%3Bh=831d9d02f9522e739825a51a11e3bc5aa531a905 (MISC)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=97e69aa62f8b5d338d6cff49be09e37cc1262838 (MISC)
CVE: CVE-2010-3877
CVE: CVE-2010-3877
Id:
CVE-2010-3877
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3877
Comment
: The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
909 ()
References:
[oss-security] 20101104 Re: CVE request: kernel stack infoleaks (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=649717 (CONFIRM)
[netdev] 20101031 [PATCH 3/3] net: tipc: fix information leak to userland (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2 (CONFIRM)
[oss-security] 20101102 CVE request: kernel stack infoleaks (MLIST)
DSA-2126 (DEBIAN)
44630 (BID)
42884 (SECUNIA)
RHSA-2011:0017 (REDHAT)
MDVSA-2011:029 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
kernel-getname-info-disc(64578) (XF)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=88f8a5e3e7defccd3925cabb1ee4d3994e5cdb52 (MISC)
CVE: CVE-2010-3876
CVE: CVE-2010-3876
Id:
CVE-2010-3876
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3876
Comment
: net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
909 ()
References:
[oss-security] 20101104 Re: CVE request: kernel stack infoleaks (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=649715 (CONFIRM)
[oss-security] 20101102 Re: CVE request: kernel stack infoleaks (MLIST)
[oss-security] 20101102 Re: CVE request: kernel stack infoleaks (MLIST)
[netdev] 20101031 [PATCH 2/3] net: packet: fix information leak to userland (MLIST)
[oss-security] 20101102 Re: CVE request: kernel stack infoleaks (MLIST)
[oss-security] 20101102 CVE request: kernel stack infoleaks (MLIST)
RHSA-2010:0958 (REDHAT)
RHSA-2011:0004 (REDHAT)
DSA-2126 (DEBIAN)
ADV-2011-0024 (VUPEN)
44630 (BID)
42789 (SECUNIA)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f (MISC)
CVE: CVE-2010-3875
CVE: CVE-2010-3875
Id:
CVE-2010-3875
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875
Comment
: The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=649713 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc2 (CONFIRM)
[oss-security] 20101102 CVE request: kernel stack infoleaks (MLIST)
[netdev] 20101031 [PATCH 1/3] net: ax25: fix information leak to userland (MLIST)
[oss-security] 20101104 Re: CVE request: kernel stack infoleaks (MLIST)
DSA-2126 (DEBIAN)
44630 (BID)
MDVSA-2011:029 (MANDRIVA)
MDVSA-2011:051 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fe10ae53384e48c51996941b7720ee16995cbcb7 (MISC)
CVE: CVE-2010-3865
CVE: CVE-2010-3865
Id:
CVE-2010-3865
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3865
Comment
: Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request, which triggers a buffer overflow.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE:
190 (Integer Overflow or Wraparound)
References:
44549 (BID)
[oss-security] 20101029 CVE request: kernel: iovec overflow in rds_rdma_pages() (MLIST)
[oss-security] 20101101 Re: CVE request: kernel: iovec overflow in rds_rdma_pages() (MLIST)
[netdev] 20101028 Re: [Security] TIPC security issues (MLIST)
[netdev] 20101028 Re: [Security] TIPC security issues (MLIST)
SUSE-SA:2010:057 (SUSE)
SUSE-SA:2011:002 (SUSE)
SUSE-SA:2011:001 (SUSE)
RHSA-2011:0004 (REDHAT)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
42801 (SECUNIA)
ADV-2011-0024 (VUPEN)
42789 (SECUNIA)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
kernel-rdsrdmapages-overflow(62881) (XF)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
CVE: CVE-2010-3861
CVE: CVE-2010-3861
Id:
CVE-2010-3861
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3861
Comment
: The ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize a certain block of heap memory, which allows local users to obtain potentially sensitive information via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value, a different vulnerability than CVE-2010-2478.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
44427 (BID)
[oss-security] 20101026 Re: CVE request: kernel: heap contents leak from ETHTOOL_GRXCLSRLALL (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=646725 (CONFIRM)
[oss-security] 20101025 CVE request: kernel: heap contents leak from ETHTOOL_GRXCLSRLALL (MLIST)
SUSE-SA:2011:001 (SUSE)
RHSA-2010:0958 (REDHAT)
SUSE-SA:2011:002 (SUSE)
ADV-2011-0012 (VUPEN)
42758 (SECUNIA)
42778 (SECUNIA)
ADV-2011-0070 (VUPEN)
USN-1041-1 (UBUNTU)
42801 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ae6df5f96a51818d6376da5307d773baeece4014 (MISC)
CVE: CVE-2010-3705
CVE: CVE-2010-3705
Id:
CVE-2010-3705
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3705
Comment
: The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.
CVSSv2 Score:
8.3
Access vector:
ADJACENT_NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:A/AC:L/Au:N/C:C/I:C/A:C
CWE:
400 (Uncontrolled Resource Consumption ('Resource Exhaustion'))
References:
[oss-security] 20101004 Re: CVE request: kernel: SCTP memory corruption in HMAC handling (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=640036 (CONFIRM)
[linux-kernel] 20101001 [PATCH] Fix out-of-bounds reading in sctp_asoc_get_hmac() (MLIST)
[oss-security] 20101004 CVE request: kernel: SCTP memory corruption in HMAC handling (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
RHSA-2010:0842 (REDHAT)
USN-1000-1 (UBUNTU)
42745 (SECUNIA)
FEDORA-2010-18983 (FEDORA)
ADV-2010-3321 (VUPEN)
DSA-2126 (DEBIAN)
RHSA-2010:0958 (REDHAT)
MDVSA-2011:029 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=51e97a12bef19b7e43199fc153cf9bd5f2140362 (MISC)
CVE: CVE-2010-3437
CVE: CVE-2010-3437
Id:
CVE-2010-3437
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3437
Comment
: Integer signedness error in the pkt_find_dev_from_minor function in drivers/block/pktcdvd.c in the Linux kernel before 2.6.36-rc6 allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and system crash) via a crafted index value in a PKT_CTRL_CMD_STATUS ioctl call.
CVSSv2 Score:
6.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:N/A:C
CWE:
476 (NULL Pointer Dereference)
References:
43551 (BID)
http://jon.oberheide.org/files/cve-2010-3437.c (MISC)
15150 (EXPLOIT-DB)
[oss-security] 20100928 CVE request - kernel: pktcdvd ioctl dev_minor missing range check (MLIST)
[oss-security] 20100928 Re: CVE request - kernel: pktcdvd ioctl dev_minor missing range check (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=638085 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc6 (CONFIRM)
RHSA-2010:0842 (REDHAT)
USN-1000-1 (UBUNTU)
SUSE-SA:2011:001 (SUSE)
DSA-2126 (DEBIAN)
SUSE-SA:2011:002 (SUSE)
42801 (SECUNIA)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
SUSE-SA:2010:060 (SUSE)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
MDVSA-2011:029 (MANDRIVA)
MDVSA-2011:051 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=252a52aa4fa22a668f019e55b3aac3ff71ec1c29 (MISC)
CVE: CVE-2010-3080
CVE: CVE-2010-3080
Id:
CVE-2010-3080
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3080
Comment
: Double free vulnerability in the snd_seq_oss_open function in sound/core/seq/oss/seq_oss_init.c in the Linux kernel before 2.6.36-rc4 might allow local users to cause a denial of service or possibly have unspecified other impact via an unsuccessful attempt to open the /dev/sequencer device.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE:
415 (Double Free)
References:
[oss-security] 20100908 CVE-2010-3080 kernel: /dev/sequencer open failure is not handled correctly (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc4 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=630551 (CONFIRM)
43062 (BID)
MDVSA-2010:198 (MANDRIVA)
SUSE-SA:2010:050 (SUSE)
USN-1000-1 (UBUNTU)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
SUSE-SA:2010:052 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=27f7ad53829f79e799a253285318bff79ece15bd (MISC)
http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=c598337660c21c0afaa9df5a65bb4a7a0cf15be8 (MISC)
CVE: CVE-2010-3079
CVE: CVE-2010-3079
Id:
CVE-2010-3079
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3079
Comment
: kernel/trace/ftrace.c in the Linux kernel before 2.6.35.5, when debugfs is enabled, does not properly handle interaction between mutex possession and llseek operations, which allows local users to cause a denial of service (NULL pointer dereference and outage of all function tracing files) via an lseek call on a file descriptor associated with the set_ftrace_filter file.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
476 (NULL Pointer Dereference)
References:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.5 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=631623 (CONFIRM)
SUSE-SA:2010:050 (SUSE)
RHSA-2010:0842 (REDHAT)
43684 (BID)
ADV-2011-0070 (VUPEN)
42758 (SECUNIA)
USN-1041-1 (UBUNTU)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9c55cb12c1c172e2d51e85fbb5a4796ca86b77e7 (MISC)
CVE: CVE-2010-2963
CVE: CVE-2010-2963
Id:
CVE-2010-2963
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2963
Comment
: drivers/media/video/v4l2-compat-ioctl32.c in the Video4Linux (V4L) implementation in the Linux kernel before 2.6.36 on 64-bit platforms does not validate the destination of a memory copy operation, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via a VIDIOCSTUNER ioctl call on a /dev/video device, followed by a VIDIOCSMICROCODE ioctl call on this device.
CVSSv2 Score:
6.2
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:C/I:C/A:C
CWE:
20 (Improper Input Validation)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=642465 (CONFIRM)
http://www.outflux.net/blog/archives/2010/10/19/cve-2010-2963-v4l-compat-exploit/ (MISC)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
1024710 (SECTRACK)
44242 (BID)
SUSE-SA:2010:053 (SUSE)
USN-1000-1 (UBUNTU)
ADV-2010-3321 (VUPEN)
FEDORA-2010-18983 (FEDORA)
42745 (SECUNIA)
DSA-2126 (DEBIAN)
SUSE-SA:2010:057 (SUSE)
MDVSA-2010:257 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3e645d6b485446c54c6745c5e2cf5c528fe4deec ()
CVE: CVE-2010-2962
CVE: CVE-2010-2962
Id:
CVE-2010-2962
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2962
Comment
: drivers/gpu/drm/i915/i915_gem.c in the Graphics Execution Manager (GEM) in the Intel i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.36 does not properly validate pointers to blocks of memory, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via crafted use of the ioctl interface, related to (1) pwrite and (2) pread operations.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE:
20 (Improper Input Validation)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=637688 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
SUSE-SA:2010:051 (SUSE)
SUSE-SA:2010:050 (SUSE)
RHSA-2010:0842 (REDHAT)
FEDORA-2010-18983 (FEDORA)
ADV-2010-3321 (VUPEN)
42745 (SECUNIA)
RHSA-2010:0958 (REDHAT)
42758 (SECUNIA)
44067 (BID)
USN-1041-1 (UBUNTU)
ADV-2011-0070 (VUPEN)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ce9d419dbecc292cc3e06e8b1d6d123d3fa813a4 ()
CVE: CVE-2010-2960
CVE: CVE-2010-2960
Id:
CVE-2010-2960
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2960
Comment
: The keyctl_session_to_parent function in security/keys/keyctl.c in the Linux kernel 2.6.35.4 and earlier expects that a certain parent session keyring exists, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a KEYCTL_SESSION_TO_PARENT argument to the keyctl function.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
476 (NULL Pointer Dereference)
References:
1024384 (SECTRACK)
42932 (BID)
[oss-security] 20100902 CVE-2010-2960 kernel: keyctl_session_to_parent null ptr deref (MLIST)
http://twitter.com/taviso/statuses/22777866582 (MISC)
https://bugzilla.redhat.com/show_bug.cgi?id=627440 (CONFIRM)
41263 (SECUNIA)
SUSE-SA:2010:050 (SUSE)
USN-1000-1 (UBUNTU)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
linux-kernel-keyctl-dos(61557) (XF)
CVE: CVE-2010-2955
CVE: CVE-2010-2955
Id:
CVE-2010-2955
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955
Comment
: The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
193 (Off-by-one Error)
References:
[linux-kernel] 20100830 Re: [PATCH] wireless extensions: fix kernel heap content leak (MLIST)
http://grsecurity.net/~spender/wireless-infoleak-fix2.patch (MISC)
[oss-security] 20100831 CVE-2010-2955 kernel: wireless: fix 64K kernel heap content leak via ioctl (MLIST)
[linux-kernel] 20100830 Re: [PATCH] wireless: fix 64K kernel heap content leak via ioctl (MLIST)
[linux-kernel] 20100827 [PATCH] wireless: fix 64K kernel heap content leak via ioctl (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100831.bz2 (CONFIRM)
41245 (SECUNIA)
https://bugzilla.redhat.com/show_bug.cgi?id=628434 (CONFIRM)
[linux-kernel] 20100830 [PATCH] wireless extensions: fix kernel heap content leak (MLIST)
http://forums.grsecurity.net/viewtopic.php?f=3&t=2290 (MISC)
RHSA-2010:0771 (REDHAT)
RHSA-2010:0842 (REDHAT)
USN-1000-1 (UBUNTU)
SUSE-SA:2011:007 (SUSE)
42885 (BID)
ADV-2011-0298 (VUPEN)
SUSE-SA:2010:054 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/linville/wireless-2.6.git%3Ba=commit%3Bh=42da2f948d949efd0111309f5827bf0298bcc9a4 (MISC)
CVE: CVE-2010-2954
CVE: CVE-2010-2954
Id:
CVE-2010-2954
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954
Comment
: The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
476 (NULL Pointer Dereference)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=628770 (CONFIRM)
[oss-security] 20100901 CVE-2010-2954 kernel: irda null ptr deref (MLIST)
http://twitter.com/taviso/statuses/22635752128 (MISC)
[netdev] 20100830 [PATCH] irda: Correctly clean up self->ias_obj on irda_bind() failure. (MLIST)
41234 (SECUNIA)
ADV-2010-2266 (VUPEN)
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc3-next-20100901.bz2 (CONFIRM)
ADV-2010-2430 (VUPEN)
SUSE-SA:2010:041 (SUSE)
41512 (SECUNIA)
SUSE-SA:2010:050 (SUSE)
USN-1000-1 (UBUNTU)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
SUSE-SA:2010:052 (SUSE)
kernel-irdabind-dos(61522) (XF)
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=628e300cccaa628d8fb92aa28cb7530a3d5f2257 (MISC)
CVE: CVE-2010-3081
CVE: CVE-2010-3081
Id:
CVE-2010-3081
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081
Comment
: The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=634457 (CONFIRM)
http://sota.gen.nz/compat1/ (MISC)
20100916 Workaround for Ac1db1tch3z exploit. (FULLDISC)
http://isc.sans.edu/diary.html?storyid=9574 (MISC)
http://blog.ksplice.com/2010/09/cve-2010-3081/ (MISC)
https://access.redhat.com/kb/docs/DOC-40265 (CONFIRM)
20100916 Ac1db1tch3z vs x86_64 Linux Kernel (FULLDISC)
[oss-security] 20100916 CVE-2010-3081 kernel: 64-bit Compatibility Mode Stack Pointer Underflow (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log (CONFIRM)
SUSE-SR:2010:017 (SUSE)
RHSA-2010:0758 (REDHAT)
MDVSA-2010:198 (MANDRIVA)
MDVSA-2010:214 (MANDRIVA)
MDVSA-2010:247 (MANDRIVA)
RHSA-2010:0882 (REDHAT)
SUSE-SA:2010:050 (SUSE)
http://www.vmware.com/security/advisories/VMSA-2010-0017.html (CONFIRM)
ADV-2010-3083 (VUPEN)
RHSA-2010:0842 (REDHAT)
42384 (SECUNIA)
ADV-2010-3117 (VUPEN)
20101130 VMSA-2010-0017 VMware ESX third party update for Service Console kerne (BUGTRAQ)
http://www.vmware.com/security/advisories/VMSA-2011-0003.html (CONFIRM)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
43315 (SECUNIA)
20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6 (MISC)
CVE: CVE-2010-3850
CVE: CVE-2010-3850
Id:
CVE-2010-3850
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3850
Comment
: The ec_dev_ioctl function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2 does not require the CAP_NET_ADMIN capability, which allows local users to bypass intended access restrictions and configure econet addresses via an SIOCSIFADDR ioctl call.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
References:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=644156 (CONFIRM)
[oss-security] 20101129 kernel: Multiple vulnerabilities in AF_ECONET (MLIST)
20101207 Linux kernel exploit (FULLDISC)
USN-1023-1 (UBUNTU)
DSA-2126 (DEBIAN)
MDVSA-2010:257 (MANDRIVA)
43056 (SECUNIA)
SUSE-SA:2011:005 (SUSE)
ADV-2011-0213 (VUPEN)
43291 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:008 (SUSE)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:007 (SUSE)
MDVSA-2011:051 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=16c41745c7b92a243d0874f534c1655196c64b74 (MISC)
CVE: CVE-2010-3849
CVE: CVE-2010-3849
Id:
CVE-2010-3849
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3849
Comment
: The econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a sendmsg call that specifies a NULL value for the remote address field.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CWE:
476 (NULL Pointer Dereference)
References:
20101207 Linux kernel exploit (FULLDISC)
[oss-security] 20101129 kernel: Multiple vulnerabilities in AF_ECONET (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=644156 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
USN-1023-1 (UBUNTU)
DSA-2126 (DEBIAN)
MDVSA-2010:257 (MANDRIVA)
SUSE-SA:2011:005 (SUSE)
43056 (SECUNIA)
ADV-2011-0213 (VUPEN)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:008 (SUSE)
ADV-2011-0375 (VUPEN)
43291 (SECUNIA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa0e846494792e722d817b9d3d625a4ef4896c96 (MISC)
CVE: CVE-2010-3848
CVE: CVE-2010-3848
Id:
CVE-2010-3848
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3848
Comment
: Stack-based buffer overflow in the econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to gain privileges by providing a large number of iovec structures.
CVSSv2 Score:
6.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE:
787 (Out-of-bounds Write)
References:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
[oss-security] 20101129 kernel: Multiple vulnerabilities in AF_ECONET (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=644156 (CONFIRM)
USN-1023-1 (UBUNTU)
DSA-2126 (DEBIAN)
MDVSA-2010:257 (MANDRIVA)
ADV-2011-0213 (VUPEN)
43056 (SECUNIA)
SUSE-SA:2011:005 (SUSE)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0375 (VUPEN)
43291 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:008 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a27e13d370415add3487949c60810e36069a23a6 (MISC)
CVE: CVE-2010-3904
CVE: CVE-2010-3904
Id:
CVE-2010-3904
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3904
Comment
: The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE:
20 (Improper Input Validation)
References:
VU#362983 (CERT-VN)
http://www.vsecurity.com/resources/advisory/20101019-1/ (MISC)
1024613 (SECTRACK)
http://www.vsecurity.com/download/tools/linux-rds-exploit.c (MISC)
https://bugzilla.redhat.com/show_bug.cgi?id=642896 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
USN-1000-1 (UBUNTU)
RHSA-2010:0842 (REDHAT)
SUSE-SA:2010:053 (SUSE)
RHSA-2010:0792 (REDHAT)
SUSE-SA:2010:057 (SUSE)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
44677 (EXPLOIT-DB)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html (MISC)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=799c10559d60f159ab2232203f222f18fa3c4a5f ()
Content available only for registered users!
ovaldb@altx-soft.com