The proc_do_xprt function in net/sunrpc/sysctl.c in the Linux kernel 2.6.26.3 does not check the length of a certain buffer obtained from userspace, which allows local users to overflow a stack-based buffer and have unspecified other impact via a crafted read system call for the /proc/sys/sunrpc/transports file.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2008-09-04T17:00:00
Updated: 2024-08-07T09:53:00.779Z
Reserved: 2008-09-04T00:00:00
Link: CVE-2008-3911
Vulnrichment
No data.
NVD
Status : Modified
Published: 2008-09-04T17:41:00.000
Modified: 2023-11-07T02:02:36.860
Link: CVE-2008-3911
Redhat
No data.