CVE-2008-7256
Published: 3 June 2010
mm/shmem.c in the Linux kernel before 2.6.28-rc8, when strict overcommit is enabled and CONFIG_SECURITY is disabled, does not properly handle the export of shmemfs objects by knfsd, which allows attackers to cause a denial of service (NULL pointer dereference and knfsd crash) or possibly have unspecified other impact via unknown vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-1643.
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Released
(2.6.24-28.73)
|
|
jaunty |
Not vulnerable
|
|
karmic |
Not vulnerable
|
|
lucid |
Not vulnerable
|
|
upstream |
Released
(2.6.28~rc8)
|
|
Patches: upstream: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1b79cd04fab80be61dcd2732e2423aafde9a4c1c hardy: http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2008-7256/patches/hardy/linux/0002-nfsd-fix-vm-overcommit-crash-fix-2.txt |
||
linux-source-2.6.15 Launchpad, Ubuntu, Debian |
dapper |
Released
(2.6.15-55.86)
|
hardy |
Does not exist
|
|
jaunty |
Does not exist
|
|
karmic |
Does not exist
|
|
lucid |
Does not exist
|
|
upstream |
Released
(2.6.28~rc8)
|
|
Patches: dapper: http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2008-7256/patches/dapper/linux/0002-nfsd-fix-vm-overcommit-crash-fix-2.txt |