CVE-2008-0009

The vmsplice_to_user function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which might allow local users to access arbitrary kernel memory locations.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*

History

21 Nov 2024, 00:40

Type Values Removed Values Added
References () http://isec.pl/vulnerabilities/isec-0026-vmsplice_to_kernel.txt - Exploit () http://isec.pl/vulnerabilities/isec-0026-vmsplice_to_kernel.txt - Exploit
References () http://secunia.com/advisories/28835 - () http://secunia.com/advisories/28835 -
References () http://secunia.com/advisories/28896 - () http://secunia.com/advisories/28896 -
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1 - Exploit () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1 - Exploit
References () http://www.securityfocus.com/archive/1/487982/100/0/threaded - () http://www.securityfocus.com/archive/1/487982/100/0/threaded -
References () http://www.securityfocus.com/bid/27704 - () http://www.securityfocus.com/bid/27704 -
References () http://www.securityfocus.com/bid/27799 - () http://www.securityfocus.com/bid/27799 -
References () http://www.vupen.com/english/advisories/2008/0487/references - () http://www.vupen.com/english/advisories/2008/0487/references -
References () https://bugzilla.redhat.com/show_bug.cgi?id=431206 - Exploit () https://bugzilla.redhat.com/show_bug.cgi?id=431206 - Exploit
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html -

Information

Published : 2008-02-12 21:00

Updated : 2024-11-21 00:40


NVD link : CVE-2008-0009

Mitre link : CVE-2008-0009

CVE.ORG link : CVE-2008-0009


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-20

Improper Input Validation