The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which allow local users to read from arbitrary kernel memory locations.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.debian.org/security/2008/dsa-1494 | vendor advisory |
http://www.securityfocus.com/bid/27796 | vdb entry |
http://secunia.com/advisories/28875 | third party advisory |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1 | exploit |
http://www.vupen.com/english/advisories/2008/0487/references | vdb entry |
http://www.securityfocus.com/archive/1/487982/100/0/threaded | mailing list |
http://isec.pl/vulnerabilities/isec-0026-vmsplice_to_kernel.txt | exploit |
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00254.html | vendor advisory |
http://secunia.com/advisories/28896 | third party advisory |
http://secunia.com/advisories/28835 | third party advisory |
https://www.exploit-db.com/exploits/5093 | exploit |
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00255.html | vendor advisory |
http://www.securityfocus.com/bid/27704 | vdb entry |