4.9
CVSSv2

CVE-2008-2372

Published: 02/07/2008 Updated: 13/02/2023
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
VMScore: 437
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The Linux kernel 2.6.24 and 2.6.25 prior to 2.6.25.9 allows local users to cause a denial of service (memory consumption) via a large number of calls to the get_user_pages function, which lacks a ZERO_PAGE optimization and results in allocation of "useless newly zeroed pages."

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.25.5

linux linux kernel 2.6.25.3

linux linux kernel 2.6.24

linux linux kernel 2.6.25.8

linux linux kernel 2.6.25.1

linux linux kernel 2.6.25.4

linux linux kernel 2.6.25

linux linux kernel 2.6.25.2

linux linux kernel 2.6.25.7

linux linux kernel 2.6.25.6

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that resolve several security issues and fixvarious bugs are now available for Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedH ...
It was discovered that the direct-IO subsystem did not correctly validate certain structures A local attacker could exploit this to cause a system crash, leading to a denial of service (CVE-2007-6716) ...