[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

USN-1092-1 -- linux-source-2.6.15 vulnerabilities

ID: oval:org.secpod.oval:def:700269Date: (C)2011-03-29   (M)2024-01-02
Class: PATCHFamily: unix




Dan Rosenberg discovered that multiple terminal ioctls did not correctly initialize structure memory. A local attacker could exploit this to read portions of kernel stack memory, leading to a loss of privacy. Dan Rosenberg discovered that the socket filters did not correctly initialize structure memory. A local attacker could create malicious filters to read portions of kernel stack memory, leading to a loss of privacy. Dan Rosenberg discovered that certain iovec operations did not calculate page counts correctly. A local attacker could exploit this to crash the system, leading to a denial of service. Dan Rosenberg discovered that the SCSI subsystem did not correctly validate iov segments. A local attacker with access to a SCSI device could send specially crafted requests to crash the system, leading to a denial of service. Alan Cox discovered that the HCI UART driver did not correctly check if a write operation was available. A local attacker could exploit this flaw to gain root privileges

Platform:
Ubuntu 6.06
Product:
linux-source-2.6.15
Reference:
USN-1092-1
CVE-2010-4242
CVE-2010-4163
CVE-2010-4162
CVE-2010-4158
CVE-2010-4077
CVE-2010-4075
CVE    6
CVE-2010-4077
CVE-2010-4158
CVE-2010-4242
CVE-2010-4075
...
CPE    1
cpe:/o:ubuntu:ubuntu_linux:6.06

© SecPod Technologies