CVE-2008-0010
Publication date 12 February 2008
Last updated 24 July 2024
Ubuntu priority
The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which allow local users to read from arbitrary kernel memory locations.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-source-2.6.15 | ||
linux-source-2.6.17 | ||
linux-source-2.6.20 | ||
linux-source-2.6.22 | ||
Notes
jdstrand
dapper-gutsy not affected. Only 2.6.23 - 2.6.24. See: http://isec.pl/vulnerabilities/isec-0026-vmsplice_to_kernel.txt local root exploit on hardy (exploit code exists) amitk will upload 2.6.24.2 for hardy soon