First published: Tue Feb 12 2008(Updated: )
The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which allow local users to read from arbitrary kernel memory locations.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.23.4 | |
Linux Kernel | =2.6.22.4 | |
Linux Kernel | =2.6.23.7 | |
Linux Kernel | =2.6.24-rc3 | |
Linux Kernel | =2.6.22.1 | |
Linux Kernel | =2.6.22 | |
Linux Kernel | =2.6.23.1 | |
Linux Kernel | =2.6.22.7 | |
Linux Kernel | =2.6.23-rc2 | |
Linux Kernel | =2.6.23.9 | |
Linux Kernel | =2.6.22.6 | |
Linux Kernel | =2.6.23.3 | |
Linux Kernel | =2.6.22.3 | |
Linux Kernel | =2.6.23-rc1 | |
Linux Kernel | =2.6.23.14 | |
Linux Kernel | =2.6.23 | |
Linux Kernel | =2.6.23.2 | |
Linux Kernel | =2.6.24-rc2 | |
Linux Kernel | =2.6.23.5 | |
Linux Kernel | =2.6.23.6 | |
Linux Kernel | =2.6.22-rc6 | |
Linux Kernel | =2.6.22.5 | |
Linux Kernel | =2.6.22.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0010 has a high severity rating due to its potential to allow local users to read arbitrary kernel memory.
To fix CVE-2008-0010, upgrade the Linux kernel to version 2.6.24.1 or later.
CVE-2008-0010 affects Linux kernel versions 2.6.22 through 2.6.24.
No, CVE-2008-0010 can only be exploited by local users on the affected systems.
CVE-2008-0010 is a memory access vulnerability that involves inadequate validation of user space pointers.