Lucene search

K
osvGoogleOSV:DSA-2110-1
HistorySep 17, 2010 - 12:00 a.m.

linux-2.6 - several issues

2010-09-1700:00:00
Google
osv.dev
10

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information leak.
The Common Vulnerabilities and Exposures project identifies the following
problems:

  • CVE-2010-2492
    Andre Osterhues reported an issue in the eCryptfs subsystem. A buffer
    overflow condition may allow local users to cause a denial of service
    or gain elevated privileges.
  • CVE-2010-2954
    Tavis Ormandy reported an issue in the irda subsystem which may allow
    local users to cause a denial of service via a NULL pointer dereference.
  • CVE-2010-3078
    Dan Rosenberg discovered an issue in the XFS file system that allows
    local users to read potentially sensitive kernel memory.
  • CVE-2010-3080
    Tavis Ormandy reported an issue in the ALSA sequencer OSS emulation
    layer. Local users with sufficient privileges to open /dev/sequencer
    (by default on Debian, this is members of the β€˜audio’ group) can
    cause a denial of service via a NULL pointer dereference.
  • CVE-2010-3081
    Ben Hawkes discovered an issue in the 32-bit compatibility code
    for 64-bit systems. Local users can gain elevated privileges due
    to insufficient checks in compat_alloc_user_space allocations.

For the stable distribution (lenny), this problem has been fixed in
version 2.6.26-25lenny1.

We recommend that you upgrade your linux-2.6 and user-mode-linux
packages.

The following matrix lists additional source packages that were
rebuilt for compatibility with or to take advantage of this update:

Debian 5.0 (lenny)
user-mode-linux 2.6.26-1um-2+25lenny1

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C