The pci_register_iommu_region function in arch/sparc/kernel/pci_common.c in the Linux kernel before 2.6.29 on the sparc64 platform allows local users to cause a denial of service (system crash) by reading the /proc/iomem file, related to uninitialized pointers and the request_resource function.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The pci_register_iommu_region function in arch/sparc/kernel/pci_common.c in the Linux kernel before 2.6.29 on the sparc64 platform allows local users to cause a denial of service (system crash) by reading the /proc/iomem file, related to uninitialized pointers and the request_resource function.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/51196 | vdb-entry x_refsource_XF |
http://secunia.com/advisories/35656 | third-party-advisory x_refsource_SECUNIA |
http://www.debian.org/security/2009/dsa-1844 | vendor-advisory x_refsource_DEBIAN |
http://osvdb.org/54908 | vdb-entry x_refsource_OSVDB |
http://www.securityfocus.com/bid/35415 | vdb-entry x_refsource_BID |
http://secunia.com/advisories/36051 | third-party-advisory x_refsource_SECUNIA |
http://www.ubuntu.com/usn/usn-793-1 | vendor-advisory x_refsource_UBUNTU |
http://www.openwall.com/lists/oss-security/2009/06/03/3 | mailing-list x_refsource_MLIST |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29 | x_refsource_CONFIRM |
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=192d7a4667c6d11d1a174ec4cad9a3c5d5f9043c | x_refsource_CONFIRM |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/51196 | vdb-entry x_refsource_XF x_transferred |
http://secunia.com/advisories/35656 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.debian.org/security/2009/dsa-1844 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://osvdb.org/54908 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.securityfocus.com/bid/35415 | vdb-entry x_refsource_BID x_transferred |
http://secunia.com/advisories/36051 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.ubuntu.com/usn/usn-793-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
http://www.openwall.com/lists/oss-security/2009/06/03/3 | mailing-list x_refsource_MLIST x_transferred |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29 | x_refsource_CONFIRM x_transferred |
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=192d7a4667c6d11d1a174ec4cad9a3c5d5f9043c | x_refsource_CONFIRM x_transferred |
The pci_register_iommu_region function in arch/sparc/kernel/pci_common.c in the Linux kernel before 2.6.29 on the sparc64 platform allows local users to cause a denial of service (system crash) by reading the /proc/iomem file, related to uninitialized pointers and the request_resource function.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 4.9 | MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
Not vulnerable. This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5 or Red Hat Enterprise MRG. Red Hat does not provide support for the Linux kernel on the SPARC64 architecture.
Hyperlink | Source | Resource |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=192d7a4667c6d11d1a174ec4cad9a3c5d5f9043c | cve@mitre.org | N/A |
http://osvdb.org/54908 | cve@mitre.org | N/A |
http://secunia.com/advisories/35656 | cve@mitre.org | N/A |
http://secunia.com/advisories/36051 | cve@mitre.org | N/A |
http://www.debian.org/security/2009/dsa-1844 | cve@mitre.org | N/A |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29 | cve@mitre.org | N/A |
http://www.openwall.com/lists/oss-security/2009/06/03/3 | cve@mitre.org | N/A |
http://www.securityfocus.com/bid/35415 | cve@mitre.org | N/A |
http://www.ubuntu.com/usn/usn-793-1 | cve@mitre.org | N/A |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51196 | cve@mitre.org | N/A |