CVE-2010-3079
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
30/09/2010
Last modified:
11/04/2025
Description
kernel/trace/ftrace.c in the Linux kernel before 2.6.35.5, when debugfs is enabled, does not properly handle interaction between mutex possession and llseek operations, which allows local users to cause a denial of service (NULL pointer dereference and outage of all function tracing files) via an lseek call on a file descriptor associated with the set_ftrace_filter file.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
4.90
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.35.5 (excluding) | |
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3D9c55cb12c1c172e2d51e85fbb5a4796ca86b77e7
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
- http://secunia.com/advisories/42758
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.5
- http://www.redhat.com/support/errata/RHSA-2010-0842.html
- http://www.securityfocus.com/bid/43684
- http://www.ubuntu.com/usn/USN-1041-1
- http://www.vupen.com/english/advisories/2011/0070
- http://www.vupen.com/english/advisories/2011/0298
- https://bugzilla.redhat.com/show_bug.cgi?id=631623
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3D9c55cb12c1c172e2d51e85fbb5a4796ca86b77e7
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
- http://secunia.com/advisories/42758
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35.5
- http://www.redhat.com/support/errata/RHSA-2010-0842.html
- http://www.securityfocus.com/bid/43684
- http://www.ubuntu.com/usn/USN-1041-1
- http://www.vupen.com/english/advisories/2011/0070
- http://www.vupen.com/english/advisories/2011/0298
- https://bugzilla.redhat.com/show_bug.cgi?id=631623