4.4
CVSSv2

CVE-2010-1437

Published: 07/05/2010 Updated: 02/02/2024
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 445
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and previous versions allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.34

linux linux kernel

opensuse opensuse 11.1

suse linux enterprise server 11

suse linux enterprise desktop 11

suse linux enterprise high availability extension 11

debian debian linux 5.0

Vendor Advisories

Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel-rt packages that fix multiple security issues and severalbugs are now available for Red Hat Enterprise MRG 12The Red Hat Security Response Team has rated this update as havingimportant ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-4537 Fabian Yamaguchi reported a missing check for Ethernet frames larger than the MTU in the r8169 driver This may allo ...

Exploits

source: wwwsecurityfocuscom/bid/39719/info The Linux kernel is prone to a local memory-corruption vulnerability Attackers can exploit this issue to crash the affected computer, denying service to legitimate users Given the nature of this issue, attackers may also be able to run arbitrary code, but this has not been confirmed kernel 2 ...