CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
87.4%
Louis Rilling and Matthieu Fertré reported a use after free error in the
Linux kernel’s futex_wait function. A local user could exploit this flaw to
cause a denial of service (system crash) or possibly gain privileges via a
specially crafted application. (CVE-2014-0205)
Ben Hawkes discovered that the Linux kernel did not correctly filter
registers on 64bit kernels when performing 32bit system calls. On a 64bit
system, a local attacker could manipulate 32bit system calls to gain root
privileges. (CVE-2010-3301)
Dan Rosenberg discovered that the btrfs filesystem did not correctly
validate permissions when using the clone function. A local attacker could
overwrite the contents of file handles that were opened for append-only, or
potentially read arbitrary contents, leading to a loss of privacy.
(CVE-2010-2537, CVE-2010-2538)
Dave Chinner discovered that the XFS filesystem did not correctly order
inode lookups when exported by NFS. A remote attacker could exploit this to
read or write disk blocks that had changed file assignment or had become
unlinked, leading to a loss of privacy. (CVE-2010-2943)
Kees Cook discovered that the Intel i915 graphics driver did not correctly
validate memory regions. A local attacker with access to the video card
could read and write arbitrary kernel memory to gain root privileges.
(CVE-2010-2962)
Robert Swiecki discovered that ftrace did not correctly handle mutexes. A
local attacker could exploit this to crash the kernel, leading to a denial
of service. (CVE-2010-3079)
Dan Rosenberg discovered that several network ioctls did not clear kernel
memory correctly. A local user could exploit this to read kernel stack
memory, leading to a loss of privacy. (CVE-2010-3296, CVE-2010-3297,
CVE-2010-3298)
It was discovered that KVM did not correctly initialize certain CPU
registers. A local attacker could exploit this to crash the system, leading
to a denial of service. (CVE-2010-3698)
Brad Spengler discovered that stack memory for new a process was not
correctly calculated. A local attacker could exploit this to crash the
system, leading to a denial of service. (CVE-2010-3858)
Kees Cook discovered that the ethtool interface did not correctly clear
kernel memory. A local attacker could read kernel heap memory, leading to a
loss of privacy. (CVE-2010-3861)
Kees Cook and Vasiliy Kulikov discovered that the shm interface did not
clear kernel memory correctly. A local attacker could exploit this to read
kernel stack memory, leading to a loss of privacy. (CVE-2010-4072)
Dan Rosenberg discovered that the RME Hammerfall DSP audio interface driver
did not correctly clear kernel memory. A local attacker could exploit this
to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4080,
CVE-2010-4081)
James Bottomley discovered that the ICP vortex storage array controller
driver did not validate certain sizes. A local attacker on a 64bit system
could exploit this to crash the kernel, leading to a denial of service.
(CVE-2010-4157)
Alan Cox discovered that the HCI UART driver did not correctly check if a
write operation was available. If the mmap_min-addr sysctl was changed from
the Ubuntu default to a value of 0, a local attacker could exploit this
flaw to gain root privileges. (CVE-2010-4242)
Kees Cook discovered that some ethtool functions did not correctly clear
heap memory. A local attacker with CAP_NET_ADMIN privileges could exploit
this to read portions of kernel heap memory, leading to a loss of privacy.
(CVE-2010-4655)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 9.10 | noarch | linux-image-2.6.31-22-server | < 2.6.31-22.70 | UNKNOWN |
Ubuntu | 9.10 | noarch | block-modules-2.6.31-22-generic-di | < 2.6.31-22.70 | UNKNOWN |
Ubuntu | 9.10 | noarch | char-modules-2.6.31-22-generic-di | < 2.6.31-22.70 | UNKNOWN |
Ubuntu | 9.10 | noarch | crypto-modules-2.6.31-22-generic-di | < 2.6.31-22.70 | UNKNOWN |
Ubuntu | 9.10 | noarch | fat-modules-2.6.31-22-generic-di | < 2.6.31-22.70 | UNKNOWN |
Ubuntu | 9.10 | noarch | fb-modules-2.6.31-22-generic-di | < 2.6.31-22.70 | UNKNOWN |
Ubuntu | 9.10 | noarch | firewire-core-modules-2.6.31-22-generic-di | < 2.6.31-22.70 | UNKNOWN |
Ubuntu | 9.10 | noarch | floppy-modules-2.6.31-22-generic-di | < 2.6.31-22.70 | UNKNOWN |
Ubuntu | 9.10 | noarch | fs-core-modules-2.6.31-22-generic-di | < 2.6.31-22.70 | UNKNOWN |
Ubuntu | 9.10 | noarch | fs-secondary-modules-2.6.31-22-generic-di | < 2.6.31-22.70 | UNKNOWN |
ubuntu.com/security/CVE-2010-2537
ubuntu.com/security/CVE-2010-2538
ubuntu.com/security/CVE-2010-2943
ubuntu.com/security/CVE-2010-2962
ubuntu.com/security/CVE-2010-3079
ubuntu.com/security/CVE-2010-3296
ubuntu.com/security/CVE-2010-3297
ubuntu.com/security/CVE-2010-3298
ubuntu.com/security/CVE-2010-3301
ubuntu.com/security/CVE-2010-3698
ubuntu.com/security/CVE-2010-3858
ubuntu.com/security/CVE-2010-3861
ubuntu.com/security/CVE-2010-4072
ubuntu.com/security/CVE-2010-4080
ubuntu.com/security/CVE-2010-4081
ubuntu.com/security/CVE-2010-4157
ubuntu.com/security/CVE-2010-4242
ubuntu.com/security/CVE-2010-4655
ubuntu.com/security/CVE-2014-0205
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
87.4%