283 lines
10 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2009-0745",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-02-27T17:30:09.920",
"lastModified": "2023-11-07T02:03:42.767",
2023-04-24 12:24:31 +02:00
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "The ext4_group_add function in fs/ext4/resize.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not properly initialize the group descriptor during a resize (aka resize2fs) operation, which might allow local users to cause a denial of service (OOPS) by arranging for crafted values to be present in available memory."
},
{
"lang": "es",
"value": "La funci\u00f3n ext4_group_add en fs/ext4/resize.c en el kernel de Linux v2.6.27 anteriores a v2.6.27.19 y v2.6.28 anteriores a v2.6.28.7 no inicializa de forma adecuada el descriptor de grupo durante una operaci\u00f3n de cambio de tama\u00f1o (tambi\u00e9n conocido como resize2fs), que podr\u00eda permitir a los usuarios locales, provocar una denegaci\u00f3n de servicio (OOPS) organizando valores manipulados, para estar en la memoria disponible."
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG. \n\nThis issue was addressed in Red Hat Enterprise Linux 5 by\nhttps://rhn.redhat.com/errata/RHSA-2009-1243.html",
"lastModified": "2009-09-02T00:00:00"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*",
"matchCriteriaId": "856FE78A-29B5-4411-98A0-4B0281C17EB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*",
"matchCriteriaId": "324B5A3E-FA65-4F02-9B8F-872F38CD1808"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C75A8FC4-58D2-4B6A-9D8E-FF12DF52E249"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DE21E2AE-9E01-471C-A419-6AB40A49C2F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ADFC2D46-65D0-426F-9AF8-8C910AE91D49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*",
"matchCriteriaId": "11795F8E-7ACD-4597-9194-FC7241DCE057"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*",
"matchCriteriaId": "60F381E1-F3C5-49BE-B094-4D90E7B108F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D82A6217-CFA6-4E72-8BED-0297E13EABF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7CEA1AF2-2DE7-4B38-987D-15FFA70F06B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7954A701-1671-4080-B1E6-47E0208FD28C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*",
"matchCriteriaId": "63D06512-EAF0-48C6-98F0-066E63FF07EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7F35DA6B-C6D4-47CC-97E7-9659DCFDD162"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D75B48F1-623A-4B96-9E08-4AA2DE748490"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6EB7C3-D9AB-43E7-8B78-2C36AE920935"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*",
"matchCriteriaId": "7FC87A28-C6A1-4E90-BD9F-A5BE1985DB50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0383E2A5-60EE-47F3-9DA8-BF75028D511F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B0C229-2A79-47E0-856A-2AE0FF97B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*",
"matchCriteriaId": "FB27B247-D6BF-49C4-B113-76C9A47B7DCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F94BA1B0-52B9-4303-9C41-3ACC3AC1945E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:*",
"matchCriteriaId": "26BD805F-08EB-42EC-BC54-26A7278E5089"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "217715A5-E69D-45C0-B8E4-5681528C651B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A87AD66C-4321-4459-8556-3B0BA38C493A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*",
"matchCriteriaId": "87A347E0-9C0B-4674-9363-3C36DA27AC45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8E0F3DF0-6BD0-4560-9A13-C6493939D8B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BE1DF7-99CB-416B-B6F9-EC40FBD7D1C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B93AF773-FBB4-4A4A-ADD5-ADA40C24CD36"
}
]
}
]
}
],
"references": [
{
"url": "http://bugzilla.kernel.org/show_bug.cgi?id=12433",
"source": "cve@mitre.org"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fdff73f094e7220602cc3f8959c7230517976412",
2023-04-24 12:24:31 +02:00
"source": "cve@mitre.org"
},
{
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19",
"source": "cve@mitre.org"
},
{
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7",
"source": "cve@mitre.org"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2009-1243.html",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/34394",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/34981",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/36562",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/37471",
"source": "cve@mitre.org"
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www.debian.org/security/2009/dsa-1749",
"source": "cve@mitre.org"
},
{
"url": "http://www.debian.org/security/2009/dsa-1787",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.ubuntu.com/usn/usn-751-1",
"source": "cve@mitre.org"
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2009/0509",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/3316",
"source": "cve@mitre.org"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10942",
"source": "cve@mitre.org"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7765",
"source": "cve@mitre.org"
}
]
}