CVE-2010-0436

Race condition in backend/ctrl.c in KDM in KDE Software Compilation (SC) 2.2.0 through 4.4.2 allows local users to change the permissions of arbitrary files, and consequently gain privileges, by blocking the removal of a certain directory that contains a control socket, related to improper interaction with ksm.
References
Link Resource
ftp://ftp.kde.org/pub/kde/security_patches/kdebase-workspace-4.3.5-CVE-2010-0436.diff Patch
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039533.html
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html
http://rhn.redhat.com/errata/RHSA-2010-0348.html
http://secunia.com/advisories/39419 Vendor Advisory
http://secunia.com/advisories/39481
http://secunia.com/advisories/39506
http://www.debian.org/security/2010/dsa-2037
http://www.kde.org/info/security/advisory-20100413-1.txt Vendor Advisory
http://www.securityfocus.com/bid/39467
http://www.vupen.com/english/advisories/2010/0879 Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=570613
https://exchange.xforce.ibmcloud.com/vulnerabilities/57823
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9999
ftp://ftp.kde.org/pub/kde/security_patches/kdebase-workspace-4.3.5-CVE-2010-0436.diff Patch
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039533.html
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html
http://rhn.redhat.com/errata/RHSA-2010-0348.html
http://secunia.com/advisories/39419 Vendor Advisory
http://secunia.com/advisories/39481
http://secunia.com/advisories/39506
http://www.debian.org/security/2010/dsa-2037
http://www.kde.org/info/security/advisory-20100413-1.txt Vendor Advisory
http://www.securityfocus.com/bid/39467
http://www.vupen.com/english/advisories/2010/0879 Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=570613
https://exchange.xforce.ibmcloud.com/vulnerabilities/57823
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9999
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kde:kde_sc:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:kde:kde_sc:3.5.10:*:*:*:*:*:*:*
cpe:2.3:a:kde:kde_sc:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:kde:kde_sc:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:12

Type Values Removed Values Added
References () ftp://ftp.kde.org/pub/kde/security_patches/kdebase-workspace-4.3.5-CVE-2010-0436.diff - Patch () ftp://ftp.kde.org/pub/kde/security_patches/kdebase-workspace-4.3.5-CVE-2010-0436.diff - Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039533.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039533.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html -
References () http://rhn.redhat.com/errata/RHSA-2010-0348.html - () http://rhn.redhat.com/errata/RHSA-2010-0348.html -
References () http://secunia.com/advisories/39419 - Vendor Advisory () http://secunia.com/advisories/39419 - Vendor Advisory
References () http://secunia.com/advisories/39481 - () http://secunia.com/advisories/39481 -
References () http://secunia.com/advisories/39506 - () http://secunia.com/advisories/39506 -
References () http://www.debian.org/security/2010/dsa-2037 - () http://www.debian.org/security/2010/dsa-2037 -
References () http://www.kde.org/info/security/advisory-20100413-1.txt - Vendor Advisory () http://www.kde.org/info/security/advisory-20100413-1.txt - Vendor Advisory
References () http://www.securityfocus.com/bid/39467 - () http://www.securityfocus.com/bid/39467 -
References () http://www.vupen.com/english/advisories/2010/0879 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2010/0879 - Patch, Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=570613 - () https://bugzilla.redhat.com/show_bug.cgi?id=570613 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/57823 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/57823 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9999 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9999 -

Information

Published : 2010-04-15 17:30

Updated : 2024-11-21 01:12


NVD link : CVE-2010-0436

Mitre link : CVE-2010-0436

CVE.ORG link : CVE-2010-0436


JSON object : View

Products Affected

kde

  • kde_sc
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')