Description
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1494-1 | New linux-2.6 packages fix privilege escalation |
Debian DSA |
DSA-1494-2 | New linux-2.6 packages fix privilege escalation |
EUVD |
EUVD-2008-0610 | The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010. |
Ubuntu USN |
USN-577-1 | Linux kernel vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T07:54:21.972Z
Reserved: 2008-02-05T00:00:00.000Z
Link: CVE-2008-0600
No data.
Status : Modified
Published: 2008-02-12T21:00:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-0600
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN