7.6 High
AI Score
Confidence
High
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
9.5%
Double free vulnerability in the snd_seq_oss_open function in sound/core/seq/oss/seq_oss_init.c in the Linux kernel before 2.6.36-rc4 might allow local users to cause a denial of service or possibly have unspecified other impact via an unsuccessful attempt to open the /dev/sequencer device.
git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=c598337660c21c0afaa9df5a65bb4a7a0cf15be8
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=27f7ad53829f79e799a253285318bff79ece15bd
lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.html
lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
secunia.com/advisories/42890
www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc4
www.mandriva.com/security/advisories?name=MDVSA-2010:198
www.openwall.com/lists/oss-security/2010/09/08/7
www.redhat.com/support/errata/RHSA-2011-0007.html
www.securityfocus.com/bid/43062
www.ubuntu.com/usn/USN-1000-1
www.vupen.com/english/advisories/2011/0298
bugzilla.redhat.com/show_bug.cgi?id=630551
More