[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

USN-1054-1 -- linux, linux-ec2 vulnerabilities

ID: oval:org.secpod.oval:def:700229Date: (C)2011-02-18   (M)2024-02-19
Class: PATCHFamily: unix




Gleb Napatov discovered that KVM did not correctly check certain privileged operations. A local attacker with access to a guest kernel could exploit this to crash the host system, leading to a denial of service. Steve Chen discovered that setsockopt did not correctly check MSS values. A local attacker could make a specially crafted socket call to crash the system, leading to a denial of service. Dave Jones discovered that the mprotect system call did not correctly handle merged VMAs. A local attacker could exploit this to crash the system, leading to a denial of service. Vegard Nossum discovered that memory garbage collection was not handled correctly for active sockets. A local attacker could exploit this to allocate all available kernel memory, leading to a denial of service

Platform:
Ubuntu 10.10
Ubuntu 10.04
Product:
linux
Reference:
USN-1054-1
CVE-2010-4258
CVE-2010-4256
CVE-2010-4249
CVE-2010-4243
CVE-2010-4175
CVE-2010-4169
CVE-2010-4165
CVE-2010-4164
CVE-2010-4162
CVE-2010-4160
CVE-2010-4158
CVE-2010-4083
CVE-2010-4079
CVE-2010-4073
CVE-2010-3881
CVE-2010-3874
CVE-2010-3873
CVE-2010-3859
CVE-2010-0435
CVE    19
CVE-2010-0435
CVE-2010-4162
CVE-2010-4073
CVE-2010-4083
...
CPE    2
cpe:/o:ubuntu:ubuntu_linux:10.04
cpe:/o:ubuntu:ubuntu_linux:10.10

© SecPod Technologies