Search Results (Refine Search)
- CPE Product Version: cpe:/o:linux:linux_kernel:2.6.36:rc2
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2010-3296 |
The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call. Published: September 30, 2010; 11:00:02 AM -0400 |
V3.x:(not available) V2.0: 2.1 LOW |
CVE-2010-3310 |
Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions. Published: September 29, 2010; 1:00:04 PM -0400 |
V3.x:(not available) V2.0: 1.9 LOW |
CVE-2010-3084 |
Buffer overflow in the niu_get_ethtool_tcam_all function in drivers/net/niu.c in the Linux kernel before 2.6.36-rc4 allows local users to cause a denial of service or possibly have unspecified other impact via the ETHTOOL_GRXCLSRLALL ethtool command. Published: September 29, 2010; 1:00:04 PM -0400 |
V3.x:(not available) V2.0: 7.2 HIGH |
CVE-2010-3081 |
The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010. Published: September 24, 2010; 4:00:02 PM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2010-3301 |
The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression. Published: September 22, 2010; 3:00:03 PM -0400 |
V3.x:(not available) V2.0: 7.2 HIGH |
CVE-2010-3477 |
The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel memory via vectors involving a dump operation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942. Published: September 21, 2010; 4:00:02 PM -0400 |
V3.x:(not available) V2.0: 2.1 LOW |
CVE-2010-3080 |
Double free vulnerability in the snd_seq_oss_open function in sound/core/seq/oss/seq_oss_init.c in the Linux kernel before 2.6.36-rc4 might allow local users to cause a denial of service or possibly have unspecified other impact via an unsuccessful attempt to open the /dev/sequencer device. Published: September 21, 2010; 2:00:06 PM -0400 |
V3.x:(not available) V2.0: 7.2 HIGH |
CVE-2010-3078 |
The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call. Published: September 21, 2010; 2:00:05 PM -0400 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2010-3067 |
Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call. Published: September 21, 2010; 2:00:05 PM -0400 |
V3.x:(not available) V2.0: 4.9 MEDIUM |
CVE-2010-2955 |
The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size. Published: September 08, 2010; 4:00:03 PM -0400 |
V3.x:(not available) V2.0: 2.1 LOW |
CVE-2010-2954 |
The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket. Published: September 03, 2010; 4:00:04 PM -0400 |
V3.x:(not available) V2.0: 4.9 MEDIUM |