First published: Tue Sep 22 2009(Updated: )
The sg_build_indirect function in drivers/scsi/sg.c in Linux kernel 2.6.28-rc1 through 2.6.31-rc8 uses an incorrect variable when accessing an array, which allows local users to cause a denial of service (kernel OOPS and NULL pointer dereference), as demonstrated by using xcdroast to duplicate a CD. NOTE: this is only exploitable by users who can open the cdrom device.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | =2.6.31-rc6 | |
Linux kernel | =2.6.31-rc10 | |
Linux kernel | =2.6.31-rc4 | |
Linux kernel | =2.6.31-rc5 | |
Linux kernel | =2.6.31-rc3 | |
Linux kernel | =2.6.31-rc8 | |
Linux kernel | =2.6.31-rc2 | |
Linux Kernel | =2.6.28-rc1 | |
Linux kernel | =2.6.31-rc9 | |
Linux kernel | =2.6.31-rc7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3288 has a severity rating that indicates it can lead to a denial of service due to kernel crashes.
To fix CVE-2009-3288, users should upgrade to a version of the Linux kernel that is patched for this vulnerability.
CVE-2009-3288 affects specific versions of the Linux kernel, including 2.6.28-rc1 through 2.6.31-rc8.
Exploitation of CVE-2009-3288 can lead to a kernel OOPS and a NULL pointer dereference, causing system instability.
Local users on systems running vulnerable versions of the Linux kernel could potentially impact system stability through CVE-2009-3288.