Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2010-0436

Back to Search

SUSE Linux Security Vulnerability: CVE-2010-0436

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
04/15/2010
Created
07/25/2018
Added
02/17/2015
Modified
07/04/2017

Description

Race condition in backend/ctrl.c in KDM in KDE Software Compilation (SC) 2.2.0 through 4.4.2 allows local users to change the permissions of arbitrary files, and consequently gain privileges, by blocking the removal of a certain directory that contains a control socket, related to improper interaction with ksm.

Solution(s)

  • suse-upgrade-fileshareset
  • suse-upgrade-kde4-kdm
  • suse-upgrade-kde4-kdm-branding-upstream
  • suse-upgrade-kde4-kgreeter-plugins
  • suse-upgrade-kde4-kwin
  • suse-upgrade-kdebase3
  • suse-upgrade-kdebase3-32bit
  • suse-upgrade-kdebase3-64bit
  • suse-upgrade-kdebase3-beagle
  • suse-upgrade-kdebase3-devel
  • suse-upgrade-kdebase3-extra
  • suse-upgrade-kdebase3-kdm
  • suse-upgrade-kdebase3-ksysguardd
  • suse-upgrade-kdebase3-nsplugin
  • suse-upgrade-kdebase3-nsplugin64
  • suse-upgrade-kdebase3-runtime
  • suse-upgrade-kdebase3-runtime-32bit
  • suse-upgrade-kdebase3-runtime-64bit
  • suse-upgrade-kdebase3-samba
  • suse-upgrade-kdebase3-session
  • suse-upgrade-kdebase3-x86
  • suse-upgrade-kdebase4-workspace
  • suse-upgrade-kdebase4-workspace-branding-upstream
  • suse-upgrade-kdebase4-workspace-devel
  • suse-upgrade-kdebase4-workspace-google-gadgets
  • suse-upgrade-kdebase4-workspace-ksysguardd
  • suse-upgrade-kdm
  • suse-upgrade-kdm-branding-upstream
  • suse-upgrade-kwin
  • suse-upgrade-misc-console-font
  • suse-upgrade-sap-aio-release

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;