CVE-2010-1437
Linux Kernel 2.6.34 - 'find_keyring_by_name()' Local Memory Corruption
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
-Decision
Descriptions
Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.
Condición de carrera en la función find_keyring_by_name en security/keys/keyring.c el el kernel de Linux v2.6.34-rc5 y anteriores, permite usuarios locales provocar una denegación de servicio (corrupción de memoria y caída del sistema) o posiblemente tener otros impactos, mediante comandos de sesión "keyctl" que provocan el acceso a una secuencia de pulsaciones en desuso que está bajo un borrado en la función key_cleanup.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-04-15 CVE Reserved
- 2010-04-27 First Exploit
- 2010-05-07 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
- CWE-416: Use After Free
CAPEC
References (23)
URL | Tag | Source |
---|---|---|
http://marc.info/?l=linux-kernel&m=127292492727029&w=2 | Mailing List | |
http://secunia.com/advisories/39830 | Broken Link | |
http://secunia.com/advisories/40218 | Broken Link | |
http://secunia.com/advisories/40645 | Broken Link | |
http://secunia.com/advisories/43315 | Broken Link | |
http://www.openwall.com/lists/oss-security/2010/04/27/2 | Mailing List | |
http://www.openwall.com/lists/oss-security/2010/04/28/2 | Mailing List | |
http://www.securityfocus.com/archive/1/516397/100/0/threaded | Broken Link | |
http://www.securityfocus.com/bid/39719 | Broken Link | |
http://www.vmware.com/security/advisories/VMSA-2011-0003.html | Third Party Advisory | |
http://www.vupen.com/english/advisories/2010/1857 | Broken Link | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/58254 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9715 | Broken Link | |
https://patchwork.kernel.org/patch/94038 | Broken Link |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/33886 | 2010-04-27 | |
http://marc.info/?l=linux-kernel&m=127192182917857&w=2 | 2024-08-07 | |
http://marc.info/?l=linux-kernel&m=127274294622730&w=2 | 2024-08-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=585094 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
https://patchwork.kernel.org/patch/94664 | 2024-02-02 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html | 2024-02-02 | |
http://www.debian.org/security/2010/dsa-2053 | 2024-02-02 | |
http://www.redhat.com/support/errata/RHSA-2010-0474.html | 2024-02-02 | |
https://access.redhat.com/security/cve/CVE-2010-1437 | 2010-08-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 2.6.34 Search vendor "Linux" for product "Linux Kernel" and version " < 2.6.34" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.34 Search vendor "Linux" for product "Linux Kernel" and version "2.6.34" | rc1 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.34 Search vendor "Linux" for product "Linux Kernel" and version "2.6.34" | rc2 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.34 Search vendor "Linux" for product "Linux Kernel" and version "2.6.34" | rc3 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.34 Search vendor "Linux" for product "Linux Kernel" and version "2.6.34" | rc4 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.34 Search vendor "Linux" for product "Linux Kernel" and version "2.6.34" | rc5 |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 11.1 Search vendor "Opensuse" for product "Opensuse" and version "11.1" | - |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Desktop Search vendor "Suse" for product "Linux Enterprise Desktop" | 11 Search vendor "Suse" for product "Linux Enterprise Desktop" and version "11" | - |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise High Availability Extension Search vendor "Suse" for product "Linux Enterprise High Availability Extension" | 11 Search vendor "Suse" for product "Linux Enterprise High Availability Extension" and version "11" | - |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Server Search vendor "Suse" for product "Linux Enterprise Server" | 11 Search vendor "Suse" for product "Linux Enterprise Server" and version "11" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 5.0 Search vendor "Debian" for product "Debian Linux" and version "5.0" | - |
Affected
|