6.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:N/A:C
The kernel is vulnerable to denial of service (DoS). A flaw in the Linux kernel’s packet writing driver could be triggered via the PKT_CTRL_CMD_STATUS IOCTL request, possibly allowing a local, unprivileged user with access to “/dev/pktcdvd/control” to cause an information leak. Note: By default, only users in the cdrom group have access to “/dev/pktcdvd/control”.
CPE | Name | Operator | Version |
---|---|---|---|
kernel | eq | 2.6.32__71.el6 | |
kernel | eq | 2.6.32__71.el6 |
docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/Technical_Notes/index.html#RHSA-2010:0842
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=252a52aa4fa22a668f019e55b3aac3ff71ec1c29
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=252a52aa4fa22a668f019e55b3aac3ff71ec1c29
jon.oberheide.org/files/cve-2010-3437.c
lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
secunia.com/advisories/42778
secunia.com/advisories/42801
secunia.com/advisories/42932
www.debian.org/security/2010/dsa-2126
www.exploit-db.com/exploits/15150/
www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.36-rc6
www.mandriva.com/security/advisories?name=MDVSA-2011:029
www.mandriva.com/security/advisories?name=MDVSA-2011:051
www.openwall.com/lists/oss-security/2010/09/28/2
www.openwall.com/lists/oss-security/2010/09/28/6
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2010-0842.html
www.securityfocus.com/bid/43551
www.ubuntu.com/usn/USN-1000-1
www.vupen.com/english/advisories/2011/0012
www.vupen.com/english/advisories/2011/0124
www.vupen.com/english/advisories/2011/0298
access.redhat.com/errata/RHSA-2010:0842
bugzilla.redhat.com/show_bug.cgi?id=638085