CVE-2008-0010

The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which allow local users to read from arbitrary kernel memory locations.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*

History

21 Nov 2024, 00:40

Type Values Removed Values Added
References () http://isec.pl/vulnerabilities/isec-0026-vmsplice_to_kernel.txt - Exploit () http://isec.pl/vulnerabilities/isec-0026-vmsplice_to_kernel.txt - Exploit
References () http://secunia.com/advisories/28835 - () http://secunia.com/advisories/28835 -
References () http://secunia.com/advisories/28875 - () http://secunia.com/advisories/28875 -
References () http://secunia.com/advisories/28896 - () http://secunia.com/advisories/28896 -
References () http://www.debian.org/security/2008/dsa-1494 - () http://www.debian.org/security/2008/dsa-1494 -
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1 - Exploit () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1 - Exploit
References () http://www.securityfocus.com/archive/1/487982/100/0/threaded - () http://www.securityfocus.com/archive/1/487982/100/0/threaded -
References () http://www.securityfocus.com/bid/27704 - () http://www.securityfocus.com/bid/27704 -
References () http://www.securityfocus.com/bid/27796 - () http://www.securityfocus.com/bid/27796 -
References () http://www.vupen.com/english/advisories/2008/0487/references - () http://www.vupen.com/english/advisories/2008/0487/references -
References () https://www.exploit-db.com/exploits/5093 - () https://www.exploit-db.com/exploits/5093 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html -

Information

Published : 2008-02-12 21:00

Updated : 2024-11-21 00:40


NVD link : CVE-2008-0010

Mitre link : CVE-2008-0010

CVE.ORG link : CVE-2008-0010


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-20

Improper Input Validation