[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-2372

Date: (C)2008-07-02   (M)2017-10-04
 
CVSS Score: 4.9Access Vector: LOCAL
Exploitability Subscore: 3.9Access Complexity: LOW
Impact Subscore: 6.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: COMPLETE











The Linux kernel 2.6.24 and 2.6.25 before 2.6.25.9 allows local users to cause a denial of service (memory consumption) via a large number of calls to the get_user_pages function, which lacks a ZERO_PAGE optimization and results in allocation of "useless newly zeroed pages."

Reference:
SECUNIA-30901
SECUNIA-30982
SECUNIA-31202
SECUNIA-31628
SECUNIA-32393
SECUNIA-32485
RHSA-2008:0585
RHSA-2008:0957
SUSE-SA:2008:035
SUSE-SA:2008:037
SUSE-SA:2008:038
USN-659-1
http://www.ussg.iu.edu/hypermail/linux/kernel/0804.3/3203.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=89f5b7da2a6bad2e84670422ab8192382a5aeb9f
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9
http://new-ubuntu-news.blogspot.com/2008/06/re-pending-stable-kernel-security_25.html
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207
https://issues.rpath.com/browse/RPL-2629
linux-kernel-getuserpages-dos(43550)

CPE    10
cpe:/o:linux:linux_kernel:2.6.25.7
cpe:/o:linux:linux_kernel:2.6.25.8
cpe:/o:linux:linux_kernel:2.6.25
cpe:/o:linux:linux_kernel:2.6.25.3
...
CWE    1
CWE-20

© 2013 SecPod Technologies