Podatność CVE-2011-2184


Publikacja: 2011-09-06   Modyfikacja: 2012-02-13

Opis:
The key_replace_session_keyring function in security/keys/process_keys.c in the Linux kernel before 2.6.39.1 does not initialize a certain structure member, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a KEYCTL_SESSION_TO_PARENT argument to the keyctl function, a different vulnerability than CVE-2010-2960.

W naszej bazie, znaleźliśmy następujące noty dla tego CVE:
Tytuł
Autor
Data
High
linux kernel 2.6.39 cred->user_ns in key_replace_session_keyring
Robert Swiecki
13.09.2011

Typ:

CWE-Other

Producent: Linux
Produkt: Kernel 
Wersje:
2.6.9
2.6.8.1
2.6.8
2.6.7
2.6.6
2.6.5
2.6.4
2.6.39
2.6.38.8
2.6.38.7
2.6.38.6
2.6.38.5
2.6.38.4
2.6.38.3
2.6.38.2
2.6.38.1
2.6.38
2.6.37.6
2.6.37.5
2.6.37.4
2.6.37.3
2.6.37.2
2.6.37.1
2.6.37
2.6.36.4
2.6.36.3
2.6.36.2
2.6.36.1
2.6.36
2.6.35.9
2.6.35.8
2.6.35.7
2.6.35.6
2.6.35.5
2.6.35.4
2.6.35.3
2.6.35.2
2.6.35.1
2.6.35
2.6.34.7
2.6.34.6
2.6.34.5
2.6.34.4
2.6.34.3
2.6.34.2
2.6.34.1
2.6.34
2.6.33.7
2.6.33.6
2.6.33.5
2.6.33.4
2.6.33.3
2.6.33.2
2.6.33.1
2.6.33
2.6.32.9
2.6.32.8
2.6.32.7
2.6.32.6
2.6.32.5
2.6.32.4
2.6.32.3
2.6.32.27
2.6.32.26
2.6.32.25
2.6.32.24
2.6.32.23
2.6.32.22
2.6.32.21
2.6.32.20
2.6.32.2
2.6.32.19
2.6.32.18
2.6.32.17
2.6.32.16
2.6.32.15
2.6.32.14
2.6.32.13
2.6.32.12
2.6.32.11
2.6.32.10
2.6.32.1
2.6.32
2.6.31.9
2.6.31.8
2.6.31.7
2.6.31.6
2.6.31.5
2.6.31.4
2.6.31.3
2.6.31.2
2.6.31.14
2.6.31.13
2.6.31.12
2.6.31.11
2.6.31.10
2.6.31.1
2.6.31
2.6.30.9
2.6.30.8
Zobacz więcej wersji na NVD

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

Ogólna skala CVSS
Znaczenie
Łatwość wykorzystania
7.2/10
10/10
3.9/10
Wymagany dostęp
Złożoność ataku
Autoryzacja
Lokalny
Niska
Nie wymagana
Wpływ na poufność
Wpływ na integralność
Wpływ na dostępność
Pełny
Pełny
Pełny

 Referencje:
https://lkml.org/lkml/2011/5/25/265
http://www.openwall.com/lists/oss-security/2011/06/06/2
http://www.openwall.com/lists/oss-security/2011/06/03/2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f7285b5d631fd6096b11c6af0058ed3a2b30ef4e
https://lkml.org/lkml/2011/5/24/502
https://lkml.org/lkml/2011/5/23/199
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.1
http://securityreason.com/securityalert/8371
http://alt.swiecki.net/linux_kernel/sys_open-kmem_cache_alloc-2.6.39-rc4.txt

Podobne CVE
CVE-2019-14835
A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descript...
CVE-2019-15031
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instr...
CVE-2019-15030
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transa...
CVE-2019-16234
drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
CVE-2019-16233
drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
CVE-2019-16232
drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
CVE-2019-16231
drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
CVE-2019-16230
drivers/gpu/drm/radeon/radeon_display.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.

Copyright 2019, cxsecurity.com

 

Back to Top