CVE-2010-1437
Linux Kernel 2.6.34 - 'find_keyring_by_name()' Local Memory Corruption
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
-Decision
Descriptions
Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.
Condición de carrera en la función find_keyring_by_name en security/keys/keyring.c el el kernel de Linux v2.6.34-rc5 y anteriores, permite usuarios locales provocar una denegación de servicio (corrupción de memoria y caída del sistema) o posiblemente tener otros impactos, mediante comandos de sesión "keyctl" que provocan el acceso a una secuencia de pulsaciones en desuso que está bajo un borrado en la función key_cleanup.
Junjiro R. Okajima discovered that knfsd did not correctly handle strict overcommit. Chris Guo, Jukka Taimisto, and Olli Jarva discovered that SCTP did not correctly handle invalid parameters. A remote attacker could send specially crafted traffic that could crash the system, leading to a denial of service. Mario Mikocevic discovered that GFS2 did not correctly handle certain quota structures. Toshiyuki Okajima discovered that the kernel keyring did not correctly handle dead keyrings. Brad Spengler discovered that Sparc did not correctly implement non-executable stacks. This made userspace applications vulnerable to exploits that would have been otherwise blocked due to non-executable memory protections. Dan Rosenberg discovered that the btrfs clone function did not correctly validate permissions. Dan Rosenberg discovered that GFS2 set_flags function did not correctly validate permissions. Shi Weihua discovered that btrfs xattr_set_acl function did not correctly validate permissions. Andre Osterhues discovered that eCryptfs did not correctly calculate hash values.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-04-15 CVE Reserved
- 2010-05-07 CVE Published
- 2014-06-27 First Exploit
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
- CWE-416: Use After Free
CAPEC
References (23)
URL | Tag | Source |
---|---|---|
http://marc.info/?l=linux-kernel&m=127292492727029&w=2 | Mailing List | |
http://secunia.com/advisories/39830 | Broken Link | |
http://secunia.com/advisories/40218 | Broken Link | |
http://secunia.com/advisories/40645 | Broken Link | |
http://secunia.com/advisories/43315 | Broken Link | |
http://www.openwall.com/lists/oss-security/2010/04/27/2 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2010/04/28/2 | Mailing List |
|
http://www.securityfocus.com/archive/1/516397/100/0/threaded | Broken Link | |
http://www.securityfocus.com/bid/39719 | Broken Link | |
http://www.vmware.com/security/advisories/VMSA-2011-0003.html | Third Party Advisory | |
http://www.vupen.com/english/advisories/2010/1857 | Broken Link | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/58254 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9715 | Broken Link | |
https://patchwork.kernel.org/patch/94038 | Broken Link |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/33886 | 2014-06-27 | |
http://marc.info/?l=linux-kernel&m=127192182917857&w=2 | 2024-08-07 | |
http://marc.info/?l=linux-kernel&m=127274294622730&w=2 | 2024-08-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=585094 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
https://patchwork.kernel.org/patch/94664 | 2024-02-02 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html | 2024-02-02 | |
http://www.debian.org/security/2010/dsa-2053 | 2024-02-02 | |
http://www.redhat.com/support/errata/RHSA-2010-0474.html | 2024-02-02 | |
https://access.redhat.com/security/cve/CVE-2010-1437 | 2010-08-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 2.6.34 Search vendor "Linux" for product "Linux Kernel" and version " < 2.6.34" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.34 Search vendor "Linux" for product "Linux Kernel" and version "2.6.34" | rc1 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.34 Search vendor "Linux" for product "Linux Kernel" and version "2.6.34" | rc2 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.34 Search vendor "Linux" for product "Linux Kernel" and version "2.6.34" | rc3 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.34 Search vendor "Linux" for product "Linux Kernel" and version "2.6.34" | rc4 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.34 Search vendor "Linux" for product "Linux Kernel" and version "2.6.34" | rc5 |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 11.1 Search vendor "Opensuse" for product "Opensuse" and version "11.1" | - |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Desktop Search vendor "Suse" for product "Linux Enterprise Desktop" | 11 Search vendor "Suse" for product "Linux Enterprise Desktop" and version "11" | - |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise High Availability Extension Search vendor "Suse" for product "Linux Enterprise High Availability Extension" | 11 Search vendor "Suse" for product "Linux Enterprise High Availability Extension" and version "11" | - |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Server Search vendor "Suse" for product "Linux Enterprise Server" | 11 Search vendor "Suse" for product "Linux Enterprise Server" and version "11" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 5.0 Search vendor "Debian" for product "Debian Linux" and version "5.0" | - |
Affected
|