The vmsplice_to_user function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which might allow local users to access arbitrary kernel memory locations.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=431206 | exploit |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1 | exploit |
http://www.vupen.com/english/advisories/2008/0487/references | vdb entry |
http://www.securityfocus.com/archive/1/487982/100/0/threaded | mailing list |
http://isec.pl/vulnerabilities/isec-0026-vmsplice_to_kernel.txt | exploit |
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html | vendor advisory |
http://secunia.com/advisories/28896 | third party advisory |
http://secunia.com/advisories/28835 | third party advisory |
http://www.securityfocus.com/bid/27799 | vdb entry |
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html | vendor advisory |
http://www.securityfocus.com/bid/27704 | vdb entry |