CVE
- Id
- 32489
- CVE No.
- CVE-2008-2372
- Status
- Candidate
- Description
- The Linux kernel 2.6.24 and 2.6.25 before 2.6.25.9 allows local users to cause a denial of service (memory consumption) via a large number of calls to the get_user_pages function, which lacks a ZERO_PAGE optimization and results in allocation of "useless newly zeroed pages."
- Phase
- Assigned (20080521)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
351634 | 32489 | CVE-2008-2372 | MLIST:[linux-kernel] 20080430 Re: Page Faults slower in 2.6.25-rc9 than 2.6.23 | View |
351635 | 32489 | CVE-2008-2372 | URL:http://www.ussg.iu.edu/hypermail/linux/kernel/0804.3/3203.html | View |
351636 | 32489 | CVE-2008-2372 | MISC:http://new-ubuntu-news.blogspot.com/2008/06/re-pending-stable-kernel-security_25.html | View |
351637 | 32489 | CVE-2008-2372 | CONFIRM:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=89f5b7da2a6bad2e84670422ab8192382a5aeb9f | View |
351638 | 32489 | CVE-2008-2372 | CONFIRM:http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9 | View |
351639 | 32489 | CVE-2008-2372 | CONFIRM:http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207 | View |
351640 | 32489 | CVE-2008-2372 | CONFIRM:https://issues.rpath.com/browse/RPL-2629 | View |
351641 | 32489 | CVE-2008-2372 | REDHAT:RHSA-2008:0585 | View |
351642 | 32489 | CVE-2008-2372 | URL:http://www.redhat.com/support/errata/RHSA-2008-0585.html | View |
351643 | 32489 | CVE-2008-2372 | REDHAT:RHSA-2008:0957 | View |
351644 | 32489 | CVE-2008-2372 | URL:http://www.redhat.com/support/errata/RHSA-2008-0957.html | View |
351645 | 32489 | CVE-2008-2372 | SUSE:SUSE-SA:2008:035 | View |
351646 | 32489 | CVE-2008-2372 | URL:http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html | View |
351647 | 32489 | CVE-2008-2372 | SUSE:SUSE-SA:2008:037 | View |
351648 | 32489 | CVE-2008-2372 | URL:http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html | View |
351649 | 32489 | CVE-2008-2372 | SUSE:SUSE-SA:2008:038 | View |
351650 | 32489 | CVE-2008-2372 | URL:http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html | View |
351651 | 32489 | CVE-2008-2372 | UBUNTU:USN-659-1 | View |
351652 | 32489 | CVE-2008-2372 | URL:http://www.ubuntu.com/usn/usn-659-1 | View |
351653 | 32489 | CVE-2008-2372 | OVAL:oval:org.mitre.oval:def:9383 | View |
351654 | 32489 | CVE-2008-2372 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9383 | View |
351655 | 32489 | CVE-2008-2372 | SECUNIA:30901 | View |
351656 | 32489 | CVE-2008-2372 | URL:http://secunia.com/advisories/30901 | View |
351657 | 32489 | CVE-2008-2372 | SECUNIA:31202 | View |
351658 | 32489 | CVE-2008-2372 | URL:http://secunia.com/advisories/31202 | View |
351659 | 32489 | CVE-2008-2372 | SECUNIA:31628 | View |
351660 | 32489 | CVE-2008-2372 | URL:http://secunia.com/advisories/31628 | View |
351661 | 32489 | CVE-2008-2372 | SECUNIA:32393 | View |
351662 | 32489 | CVE-2008-2372 | URL:http://secunia.com/advisories/32393 | View |
351663 | 32489 | CVE-2008-2372 | SECUNIA:32485 | View |
351664 | 32489 | CVE-2008-2372 | URL:http://secunia.com/advisories/32485 | View |
351665 | 32489 | CVE-2008-2372 | SECUNIA:30982 | View |
351666 | 32489 | CVE-2008-2372 | URL:http://secunia.com/advisories/30982 | View |
351667 | 32489 | CVE-2008-2372 | XF:linux-kernel-getuserpages-dos(43550) | View |
Related JVN
Id | JVN No. | Title | Summary | CVE No. | CVE Id | CVSS_v2 | CVSS_v3 | JVN URL | Actions |
---|---|---|---|---|---|---|---|---|---|
46228 | JVNDB-2008-001538 | Ruby の rb_ary_fill 関数における整数オーバーフローの脆弱性 | Ruby の array.c の rb_ary_fill 関数には、ARY_MAX_SIZE より大きい start 引数を伴う Array#fill メソッドを呼び出す際に整数オーバーフローが発生する脆弱性が存在します。 | CVE-2008-2376 | 32489 | 7.5 | http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-001538.html | View |