Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-2184

Опубликовано: 06 сент. 2011
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.2

Описание

The key_replace_session_keyring function in security/keys/process_keys.c in the Linux kernel before 2.6.39.1 does not initialize a certain structure member, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a KEYCTL_SESSION_TO_PARENT argument to the keyctl function, a different vulnerability than CVE-2010-2960.

РелизСтатусПримечание
devel

not-affected

3.0-0.1
esm-infra-legacy/trusty

not-affected

3.11.0-12.19
hardy

not-affected

lucid

not-affected

maverick

not-affected

natty

not-affected

precise

not-affected

3.1.0-1.1
quantal

not-affected

saucy

not-affected

trusty

not-affected

3.11.0-12.19

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

not-affected

maverick

ignored

end of life
natty

DNE

precise

DNE

quantal

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

3.4.0-1.3
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.4.0-1.3]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

DNE

trusty

not-affected

3.4.0-1.3
trusty/esm

DNE

trusty was not-affected [3.4.0-1.3]
upstream

released

3.0~rc1

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

not-affected

maverick

DNE

natty

DNE

precise

DNE

quantal

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

3.4.0-1.7
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.4.0-1.7]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

3.4.0-1.7
trusty/esm

DNE

trusty was not-affected [3.4.0-1.7]
upstream

released

3.0~rc1

Показывать по

РелизСтатусПримечание
devel

not-affected

3.1.10-8.28
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.1.10-8.28]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

3.1.10-8.28
trusty/esm

DNE

trusty was not-affected [3.1.10-8.28]
upstream

released

3.0~rc1

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

not-affected

maverick

DNE

natty

DNE

precise

DNE

quantal

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

not-affected

maverick

DNE

natty

DNE

precise

DNE

quantal

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

3.0.0-3.18
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.0.0-3.18]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

3.0.0-3.18
trusty/esm

DNE

trusty was not-affected [3.0.0-3.18]
upstream

released

3.0~rc1

Показывать по

РелизСтатусПримечание
devel

not-affected

3.4.0-3.21
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.4.0-3.21]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

3.4.0-3.21
trusty/esm

DNE

trusty was not-affected [3.4.0-3.21]
upstream

released

3.0~rc1

Показывать по

РелизСтатусПримечание
devel

not-affected

3.4.0-4.19
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.4.0-4.19]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

3.4.0-4.19
trusty/esm

DNE

trusty was not-affected [3.4.0-4.19]
upstream

released

3.0~rc1

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

not-affected

maverick

not-affected

natty

DNE

precise

DNE

quantal

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

DNE

maverick

not-affected

natty

not-affected

precise

not-affected

3.0.0-1401.2
quantal

not-affected

saucy

not-affected

trusty

DNE

Показывать по

EPSS

Процентиль: 27%
0.00096
Низкий

7.2 High

CVSS2

Связанные уязвимости

nvd
больше 14 лет назад

The key_replace_session_keyring function in security/keys/process_keys.c in the Linux kernel before 2.6.39.1 does not initialize a certain structure member, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a KEYCTL_SESSION_TO_PARENT argument to the keyctl function, a different vulnerability than CVE-2010-2960.

debian
больше 14 лет назад

The key_replace_session_keyring function in security/keys/process_keys ...

github
больше 3 лет назад

The key_replace_session_keyring function in security/keys/process_keys.c in the Linux kernel before 2.6.39.1 does not initialize a certain structure member, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a KEYCTL_SESSION_TO_PARENT argument to the keyctl function, a different vulnerability than CVE-2010-2960.

EPSS

Процентиль: 27%
0.00096
Низкий

7.2 High

CVSS2

Уязвимость CVE-2011-2184