[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

USN-1090-1 -- linux vulnerabilities

ID: oval:org.secpod.oval:def:700266Date: (C)2011-03-21   (M)2023-11-09
Class: PATCHFamily: unix




Dan Rosenberg discovered that multiple terminal ioctls did not correctly initialize structure memory. A local attacker could exploit this to read portions of kernel stack memory, leading to a loss of privacy. Dan Rosenberg discovered that the socket filters did not correctly initialize structure memory. A local attacker could create malicious filters to read portions of kernel stack memory, leading to a loss of privacy. Dan Rosenberg discovered that the SCSI subsystem did not correctly validate iov segments. A local attacker with access to a SCSI device could send specially crafted requests to crash the system, leading to a denial of service. Dan Rosenberg discovered that the RDS protocol did not correctly check ioctl arguments. A local attacker could exploit this to crash the system, leading to a denial of service

Platform:
Ubuntu 10.10
Ubuntu 10.04
Product:
linux
Reference:
USN-1090-1
CVE-2010-4668
CVE-2010-4163
CVE-2010-4075
CVE    3
CVE-2010-4075
CVE-2010-4163
CVE-2010-4668
CPE    2
cpe:/o:ubuntu:ubuntu_linux:10.04
cpe:/o:ubuntu:ubuntu_linux:10.10

© SecPod Technologies