CVE-2010-0727
kernel: bug in GFS/GFS2 locking code leads to dos
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
The gfs2_lock function in the Linux kernel before 2.6.34-rc1-next-20100312, and the gfs_lock function in the Linux kernel on Red Hat Enterprise Linux (RHEL) 5 and 6, does not properly remove POSIX locks on files that are setgid without group-execute permission, which allows local users to cause a denial of service (BUG and system crash) by locking a file on a (1) GFS or (2) GFS2 filesystem, and then changing this file's permissions.
La función gfs2_lock en el Linux kernel anterior v2.6.34-rc1-next-20100312, y la función gfs_lock en el Linux kernel de Red Hat Enterprise Linux (RHEL) v5 y v6, no elimina adecuadamente el POSIX locks en los archivos setgid sin permisos group-execute, lo que permite a usuarios locales causar una denegación de servicio (BUG y caída de sistema) bloqueando un archivo en los sistemas de archivos(1) GFS o (2) GFS2, y luego cambiar los permisos de este archivo.
It was discovered that the Linux kernel did not correctly handle memory protection of the Virtual Dynamic Shared Object page when running a 32-bit application on a 64-bit kernel. It was discovered that the r8169 network driver did not correctly check the size of Ethernet frames. Wei Yongjun discovered that SCTP did not correctly validate certain chunks. It was discovered that KVM did not correctly limit certain privileged IO accesses on x86. Evgeniy Polyakov discovered that IPv6 did not correctly handle certain TUN packets. Tons of other vulnerabilities have also been discovered and addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-02-26 CVE Reserved
- 2010-03-16 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-399: Resource Management Errors
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/39830 | Third Party Advisory | |
http://securitytracker.com/id?1023809 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11392 | Signature |
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2010/03/12/1 | 2024-08-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=570863 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://lkml.org/lkml/2010/3/11/269 | 2020-08-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 2.6.33.1 Search vendor "Linux" for product "Linux Kernel" and version " <= 2.6.33.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 5.0 Search vendor "Debian" for product "Debian Linux" and version "5.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 5.0 Search vendor "Redhat" for product "Enterprise Linux" and version "5.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 6.0 Search vendor "Redhat" for product "Enterprise Linux" and version "6.0" | - |
Affected
|