Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:32078
[Eng]
Version
6
Class
patch
ALTXid
180578
Language
Russian
Severity
High
Title
Обновление openSUSE-SU-2010:1047-1 -- обновление для Linux Kernel
Description
This security update of the openSUSE 11.1 kernel updates
the kernel to 2.6.27.56 and fixes various security issue and other bugs
Family
unix
Platform
openSUSE 11.1
Product
kernel-xen
Reference
VENDOR: openSUSE-SU-2010:1047-1
VENDOR: openSUSE-SU-2010:1047-1
Id:
openSUSE-SU-2010:1047-1
Reference:
https://lists.opensuse.org/opensuse-updates/2010-12/msg00026.html
CVE: CVE-2010-2963
CVE: CVE-2010-2963
Id:
CVE-2010-2963
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2963
Comment
: drivers/media/video/v4l2-compat-ioctl32.c in the Video4Linux (V4L) implementation in the Linux kernel before 2.6.36 on 64-bit platforms does not validate the destination of a memory copy operation, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via a VIDIOCSTUNER ioctl call on a /dev/video device, followed by a VIDIOCSMICROCODE ioctl call on this device.
CVSSv2 Score:
6.2
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:C/I:C/A:C
CWE:
20 (Improper Input Validation)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=642465 (CONFIRM)
http://www.outflux.net/blog/archives/2010/10/19/cve-2010-2963-v4l-compat-exploit/ (MISC)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
1024710 (SECTRACK)
44242 (BID)
SUSE-SA:2010:053 (SUSE)
USN-1000-1 (UBUNTU)
ADV-2010-3321 (VUPEN)
FEDORA-2010-18983 (FEDORA)
42745 (SECUNIA)
DSA-2126 (DEBIAN)
SUSE-SA:2010:057 (SUSE)
MDVSA-2010:257 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3e645d6b485446c54c6745c5e2cf5c528fe4deec ()
CVE: CVE-2010-4157
CVE: CVE-2010-4157
Id:
CVE-2010-4157
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4157
Comment
: Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large argument in an ioctl call.
CVSSv2 Score:
6.2
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:C/I:C/A:C
CWE:
190 (Integer Overflow or Wraparound)
References:
[linux-scsi] 20101008 [patch] gdth: integer overflow in ioctl (MLIST)
[oss-security] 20101108 Re: CVE request: kernel: gdth: integer overflow in ioc_general() (MLIST)
44648 (BID)
[oss-security] 20101109 Re: CVE request: kernel: gdth: integer overflow in ioc_general() (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=651147 (CONFIRM)
[oss-security] 20101109 Re: CVE request: kernel: gdth: integer overflow in ioc_general() (MLIST)
[oss-security] 20101110 Re: CVE request: kernel: gdth: integer overflow in ioc_general() (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.1 (CONFIRM)
[oss-security] 20101108 CVE request: kernel: gdth: integer overflow in ioc_general() (MLIST)
FEDORA-2010-18983 (FEDORA)
42745 (SECUNIA)
ADV-2010-3321 (VUPEN)
RHSA-2010:0958 (REDHAT)
RHSA-2011:0004 (REDHAT)
SUSE-SA:2011:001 (SUSE)
SUSE-SA:2011:002 (SUSE)
ADV-2011-0012 (VUPEN)
42801 (SECUNIA)
42778 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
ADV-2011-0024 (VUPEN)
SUSE-SA:2010:060 (SUSE)
42789 (SECUNIA)
42932 (SECUNIA)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
SUSE-SA:2011:007 (SUSE)
43291 (SECUNIA)
SUSE-SA:2011:008 (SUSE)
ADV-2011-0375 (VUPEN)
ADV-2011-0298 (VUPEN)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f63ae56e4e97fb12053590e41a4fa59e7daa74a4 (MISC)
CVE: CVE-2010-4164
CVE: CVE-2010-4164
Id:
CVE-2010-4164
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164
Comment
: Multiple integer underflows in the x25_parse_facilities function in net/x25/x25_facilities.c in the Linux kernel before 2.6.36.2 allow remote attackers to cause a denial of service (system crash) via malformed X.25 (1) X25_FAC_CLASS_A, (2) X25_FAC_CLASS_B, (3) X25_FAC_CLASS_C, or (4) X25_FAC_CLASS_D facility data, a different vulnerability than CVE-2010-3873.
CVSSv2 Score:
7.8
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CWE:
191 (Integer Underflow (Wrap or Wraparound))
References:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
[oss-security] 20101112 Re: CVE request: kernel: remote DoS in X.25 (MLIST)
[netdev] 20101111 [SECURITY] [PATCH] Prevent crashing when parsing bad X.25 (MLIST)
[oss-security] 20101111 CVE request: kernel: remote DoS in X.25 (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=652517 (CONFIRM)
DSA-2126 (DEBIAN)
SUSE-SA:2011:001 (SUSE)
SUSE-SA:2011:002 (SUSE)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
42801 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
45055 (BID)
42932 (SECUNIA)
ADV-2011-0124 (VUPEN)
SUSE-SA:2011:004 (SUSE)
43291 (SECUNIA)
ADV-2011-0298 (VUPEN)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:007 (SUSE)
SUSE-SA:2011:008 (SUSE)
MDVSA-2011:029 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5ef41308f94dcbb3b7afc56cdef1c2ba53fa5d2f (MISC)
CVE: CVE-2010-3874
CVE: CVE-2010-3874
Id:
CVE-2010-3874
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3874
Comment
: Heap-based buffer overflow in the bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.36.2 on 64-bit platforms might allow local users to cause a denial of service (memory corruption) via a connect operation.
CVSSv2 Score:
4
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:N/I:N/A:C
CWE:
787 (Out-of-bounds Write)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=649695 (CONFIRM)
[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
[oss-security] 20101104 Re: CVE request: kernel: CAN information leak (MLIST)
[netdev] 20101110 can-bcm: fix minor heap overflow (MLIST)
[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt (MLIST)
[oss-security] 20101103 CVE request: kernel: CAN information leak (MLIST)
[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt (MLIST)
[netdev] 20101102 [SECURITY] CAN info leak/minor heap overflow (MLIST)
[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt (MLIST)
[oss-security] 20101220 CVE request: kernel: CAN information leak, 2nd attempt (MLIST)
FEDORA-2010-18983 (FEDORA)
ADV-2010-3321 (VUPEN)
42745 (SECUNIA)
DSA-2126 (DEBIAN)
SUSE-SA:2011:001 (SUSE)
RHSA-2010:0958 (REDHAT)
SUSE-SA:2011:002 (SUSE)
42801 (SECUNIA)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
MDVSA-2011:029 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0597d1b99fcfc2c0eada09a698f85ed413d4ba84 (MISC)
CVE: CVE-2010-4158
CVE: CVE-2010-4158
Id:
CVE-2010-4158
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4158
Comment
: The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
20101118 Re: Kernel 0-day (BUGTRAQ)
20101109 Kernel 0-day (BUGTRAQ)
44758 (BID)
https://bugzilla.redhat.com/show_bug.cgi?id=651698 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
[netdev] 20101109 [PATCH] Prevent reading uninitialized memory with socket filters (MLIST)
20101109 Kernel 0-day (FULLDISC)
42745 (SECUNIA)
ADV-2010-3321 (VUPEN)
FEDORA-2010-18983 (FEDORA)
SUSE-SA:2011:002 (SUSE)
RHSA-2010:0958 (REDHAT)
SUSE-SA:2011:001 (SUSE)
42801 (SECUNIA)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
42932 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
RHSA-2011:0162 (REDHAT)
42963 (SECUNIA)
ADV-2011-0168 (VUPEN)
42884 (SECUNIA)
RHSA-2011:0007 (REDHAT)
RHSA-2011:0017 (REDHAT)
42890 (SECUNIA)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:008 (SUSE)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
43291 (SECUNIA)
MDVSA-2011:029 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb (MISC)
CVE: CVE-2010-4162
CVE: CVE-2010-4162
Id:
CVE-2010-4162
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4162
Comment
: Multiple integer overflows in fs/bio.c in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (system crash) via a crafted device ioctl to a SCSI device.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CWE:
190 (Integer Overflow or Wraparound)
References:
[oss-security] 20101110 CVE request: kernel: Multiple DoS issues in block layer (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=652529 (CONFIRM)
[oss-security] 20101112 Re: CVE request: kernel: Multiple DoS issues in block layer (MLIST)
42745 (SECUNIA)
FEDORA-2010-18983 (FEDORA)
ADV-2010-3321 (VUPEN)
SUSE-SA:2011:001 (SUSE)
SUSE-SA:2011:002 (SUSE)
42778 (SECUNIA)
44793 (BID)
ADV-2011-0012 (VUPEN)
42801 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
SUSE-SA:2010:060 (SUSE)
42932 (SECUNIA)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
MDVSA-2011:029 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb4644cac4a2797afc847e6c92736664d4b0ea34 (MISC)
CVE: CVE-2010-3437
CVE: CVE-2010-3437
Id:
CVE-2010-3437
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3437
Comment
: Integer signedness error in the pkt_find_dev_from_minor function in drivers/block/pktcdvd.c in the Linux kernel before 2.6.36-rc6 allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and system crash) via a crafted index value in a PKT_CTRL_CMD_STATUS ioctl call.
CVSSv2 Score:
6.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:N/A:C
CWE:
476 (NULL Pointer Dereference)
References:
43551 (BID)
http://jon.oberheide.org/files/cve-2010-3437.c (MISC)
15150 (EXPLOIT-DB)
[oss-security] 20100928 CVE request - kernel: pktcdvd ioctl dev_minor missing range check (MLIST)
[oss-security] 20100928 Re: CVE request - kernel: pktcdvd ioctl dev_minor missing range check (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=638085 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc6 (CONFIRM)
RHSA-2010:0842 (REDHAT)
USN-1000-1 (UBUNTU)
SUSE-SA:2011:001 (SUSE)
DSA-2126 (DEBIAN)
SUSE-SA:2011:002 (SUSE)
42801 (SECUNIA)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
SUSE-SA:2010:060 (SUSE)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
MDVSA-2011:029 (MANDRIVA)
MDVSA-2011:051 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=252a52aa4fa22a668f019e55b3aac3ff71ec1c29 (MISC)
CVE: CVE-2010-4078
CVE: CVE-2010-4078
Id:
CVE-2010-4078
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4078
Comment
: The sisfb_ioctl function in drivers/video/sis/sis_main.c in the Linux kernel before 2.6.36-rc6 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FBIOGET_VBLANK ioctl call.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
909 ()
References:
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6 (CONFIRM)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=648665 (CONFIRM)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures (MLIST)
SUSE-SA:2011:002 (SUSE)
DSA-2126 (DEBIAN)
SUSE-SA:2011:001 (SUSE)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
42801 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
43810 (BID)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
MDVSA-2011:051 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fd02db9de73faebc51240619c7c7f99bee9f65c7 ()
CVE: CVE-2010-4082
CVE: CVE-2010-4082
Id:
CVE-2010-4082
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4082
Comment
: The viafb_ioctl_get_viafb_info function in drivers/video/via/ioctl.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a VIAFB_GET_INFO ioctl call.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
909 ()
References:
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=648671 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc5 (CONFIRM)
[linux-kernel] 20100915 [PATCH] drivers/video/via/ioctl.c: prevent reading uninitializedstack memory (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures (MLIST)
43817 (BID)
SUSE-SA:2011:001 (SUSE)
SUSE-SA:2011:002 (SUSE)
RHSA-2010:0958 (REDHAT)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
42801 (SECUNIA)
42932 (SECUNIA)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b4aaa78f4c2f9cde2f335b14f4ca30b01f9651ca ()
CVE: CVE-2010-4073
CVE: CVE-2010-4073
Id:
CVE-2010-4073
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4073
Comment
: The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1 (CONFIRM)
[linux-kernel] 20101006 [PATCH v3] IPC: Initialize structure memory to zero for compat functions (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=648658 (CONFIRM)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
45073 (BID)
DSA-2126 (DEBIAN)
RHSA-2010:0958 (REDHAT)
SUSE-SA:2011:001 (SUSE)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
42884 (SECUNIA)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
RHSA-2011:0017 (REDHAT)
ADV-2011-0298 (VUPEN)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:007 (SUSE)
43291 (SECUNIA)
SUSE-SA:2011:008 (SUSE)
MDVSA-2011:029 (MANDRIVA)
MDVSA-2011:051 (MANDRIVA)
8366 (SREASON)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=03145beb455cf5c20a761e8451e30b8a74ba58d9 ()
CVE: CVE-2010-4072
CVE: CVE-2010-4072
Id:
CVE-2010-4072
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4072
Comment
: The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.37-rc1 (CONFIRM)
[linux-kernel] 20101006 [PATCH] ipc: initialize structure memory to zero for shmctl (MLIST)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=648656 (CONFIRM)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
45054 (BID)
SUSE-SA:2011:001 (SUSE)
DSA-2126 (DEBIAN)
RHSA-2010:0958 (REDHAT)
42778 (SECUNIA)
ADV-2011-0070 (VUPEN)
USN-1041-1 (UBUNTU)
ADV-2011-0012 (VUPEN)
42758 (SECUNIA)
ADV-2011-0124 (VUPEN)
42932 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
SUSE-SA:2011:004 (SUSE)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
RHSA-2011:0017 (REDHAT)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
42884 (SECUNIA)
ADV-2011-0280 (VUPEN)
43161 (SECUNIA)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
SUSE-SA:2011:008 (SUSE)
USN-1057-1 (UBUNTU)
43291 (SECUNIA)
ADV-2011-0375 (VUPEN)
MDVSA-2011:029 (MANDRIVA)
MDVSA-2011:051 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3af54c9bd9e6f14f896aac1bb0e8405ae0bc7a44 ()
CVE: CVE-2010-4083
CVE: CVE-2010-4083
Id:
CVE-2010-4083
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4083
Comment
: The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
909 ()
References:
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=648673 (CONFIRM)
[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 (CONFIRM)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[mm-commits] 20100923 + sys_semctl-fix-kernel-stack-leakage.patch added to -mm tree (MLIST)
DSA-2126 (DEBIAN)
RHSA-2010:0958 (REDHAT)
RHSA-2011:0004 (REDHAT)
SUSE-SA:2011:001 (SUSE)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
ADV-2011-0124 (VUPEN)
SUSE-SA:2010:060 (SUSE)
SUSE-SA:2011:004 (SUSE)
ADV-2011-0024 (VUPEN)
42932 (SECUNIA)
43809 (BID)
42789 (SECUNIA)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
42890 (SECUNIA)
RHSA-2011:0007 (REDHAT)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
ADV-2011-0375 (VUPEN)
43291 (SECUNIA)
SUSE-SA:2011:008 (SUSE)
MDVSA-2011:051 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56 ()
CVE: CVE-2010-3067
CVE: CVE-2010-3067
Id:
CVE-2010-3067
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3067
Comment
: Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
190 (Integer Overflow or Wraparound)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=629441 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2 (CONFIRM)
RHSA-2010:0758 (REDHAT)
RHSA-2010:0779 (REDHAT)
USN-1000-1 (UBUNTU)
SUSE-SA:2011:002 (SUSE)
DSA-2126 (DEBIAN)
SUSE-SA:2011:001 (SUSE)
42801 (SECUNIA)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
MDVSA-2010:257 (MANDRIVA)
RHSA-2010:0839 (REDHAT)
SUSE-SA:2010:060 (SUSE)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
43291 (SECUNIA)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:008 (SUSE)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
MDVSA-2011:029 (MANDRIVA)
MDVSA-2011:051 (MANDRIVA)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
kernel-doiosubmit-dos(61884) (XF)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478 (MISC)
CVE: CVE-2010-3442
CVE: CVE-2010-3442
Id:
CVE-2010-3442
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3442
Comment
: Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CWE:
190 (Integer Overflow or Wraparound)
References:
[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new() (MLIST)
[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new() (MLIST)
[oss-security] 20100929 CVE request - kernel: prevent heap corruption in snd_ctl_new() (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=638478 (CONFIRM)
[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new() (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc5-next-20100928.bz2 (CONFIRM)
42400 (SECUNIA)
RHSA-2010:0936 (REDHAT)
43787 (BID)
ADV-2010-3113 (VUPEN)
RHSA-2010:0842 (REDHAT)
USN-1000-1 (UBUNTU)
42745 (SECUNIA)
FEDORA-2010-18983 (FEDORA)
ADV-2010-3321 (VUPEN)
RHSA-2011:0004 (REDHAT)
RHSA-2010:0958 (REDHAT)
SUSE-SA:2011:002 (SUSE)
DSA-2126 (DEBIAN)
SUSE-SA:2011:001 (SUSE)
MDVSA-2010:257 (MANDRIVA)
ADV-2011-0012 (VUPEN)
42801 (SECUNIA)
42778 (SECUNIA)
ADV-2011-0024 (VUPEN)
42789 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
43291 (SECUNIA)
SUSE-SA:2011:008 (SUSE)
ADV-2011-0375 (VUPEN)
ADV-2011-0298 (VUPEN)
SUSE-SA:2011:007 (SUSE)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779 (MISC)
CVE: CVE-2010-4080
CVE: CVE-2010-4080
Id:
CVE-2010-4080
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4080
Comment
: The snd_hdsp_hwdep_ioctl function in sound/pci/rme9652/hdsp.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl call.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=648669 (CONFIRM)
[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures (MLIST)
[linux-kernel] 20100925 [PATCH] sound/pci/rme9652: prevent reading uninitialized stack memory (MLIST)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
45063 (BID)
45058 (BID)
SUSE-SA:2011:002 (SUSE)
RHSA-2010:0958 (REDHAT)
SUSE-SA:2011:001 (SUSE)
DSA-2126 (DEBIAN)
ADV-2011-0012 (VUPEN)
42778 (SECUNIA)
42801 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
42963 (SECUNIA)
RHSA-2011:0162 (REDHAT)
ADV-2011-0168 (VUPEN)
42890 (SECUNIA)
42884 (SECUNIA)
RHSA-2011:0007 (REDHAT)
RHSA-2011:0017 (REDHAT)
SUSE-SA:2011:007 (SUSE)
ADV-2011-0298 (VUPEN)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d ()
CVE: CVE-2010-4081
CVE: CVE-2010-4081
Id:
CVE-2010-4081
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4081
Comment
: The snd_hdspm_hwdep_ioctl function in sound/pci/rme9652/hdspm.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl call.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE:
909 ()
References:
[linux-kernel] 20100925 [PATCH] sound/pci/rme9652: prevent reading uninitialized stack memory (MLIST)
[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.36/ChangeLog-2.6.36-rc6 (CONFIRM)
[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=648670 (CONFIRM)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures (MLIST)
45063 (BID)
SUSE-SA:2011:002 (SUSE)
DSA-2126 (DEBIAN)
SUSE-SA:2011:001 (SUSE)
42778 (SECUNIA)
ADV-2011-0012 (VUPEN)
42801 (SECUNIA)
SUSE-SA:2010:060 (SUSE)
RHSA-2011:0017 (REDHAT)
42884 (SECUNIA)
RHSA-2011:0007 (REDHAT)
42890 (SECUNIA)
ADV-2011-0298 (VUPEN)
43291 (SECUNIA)
ADV-2011-0375 (VUPEN)
SUSE-SA:2011:008 (SUSE)
SUSE-SA:2011:007 (SUSE)
46397 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html (CONFIRM)
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (BUGTRAQ)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e68d3b316ab7b02a074edc4f770e6a746390cb7d ()
Content available only for registered users!
ovaldb@altx-soft.com