CVE-2009-4410 : Detail

CVE-2009-4410

0.07%V4
Local
2009-12-24
15h00 +00:00
2010-01-05
09h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The fuse_ioctl_copy_user function in the ioctl handler in fs/fuse/file.c in the Linux kernel 2.6.29-rc1 through 2.6.30.y uses the wrong variable in an argument to the kunmap function, which allows local users to cause a denial of service (panic) via unknown vectors.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.9 AV:L/AC:L/Au:N/C:N/I:N/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Linux>>Linux_kernel >> Version 2.6.29

Linux>>Linux_kernel >> Version 2.6.29

    Linux>>Linux_kernel >> Version 2.6.29

    Linux>>Linux_kernel >> Version 2.6.29

    Linux>>Linux_kernel >> Version 2.6.29

      Linux>>Linux_kernel >> Version 2.6.29

        Linux>>Linux_kernel >> Version 2.6.29.1

        Linux>>Linux_kernel >> Version 2.6.29.2

        Linux>>Linux_kernel >> Version 2.6.29.3

        Linux>>Linux_kernel >> Version 2.6.29.4

        Linux>>Linux_kernel >> Version 2.6.29.5

        Linux>>Linux_kernel >> Version 2.6.29.6

        Linux>>Linux_kernel >> Version 2.6.29.rc1

          Linux>>Linux_kernel >> Version 2.6.29.rc2

            Linux>>Linux_kernel >> Version 2.6.29.rc2-git1

              Linux>>Linux_kernel >> Version 2.6.30

              Linux>>Linux_kernel >> Version 2.6.30

              Linux>>Linux_kernel >> Version 2.6.30

              Linux>>Linux_kernel >> Version 2.6.30

              Linux>>Linux_kernel >> Version 2.6.30

                Linux>>Linux_kernel >> Version 2.6.30

                Linux>>Linux_kernel >> Version 2.6.30

                Linux>>Linux_kernel >> Version 2.6.30

                  Linux>>Linux_kernel >> Version 2.6.30.1

                  Linux>>Linux_kernel >> Version 2.6.30.2

                  Linux>>Linux_kernel >> Version 2.6.30.3

                  Linux>>Linux_kernel >> Version 2.6.30.4

                  Linux>>Linux_kernel >> Version 2.6.30.5

                  Linux>>Linux_kernel >> Version 2.6.30.6

                  Linux>>Linux_kernel >> Version 2.6.30.7

                  Linux>>Linux_kernel >> Version 2.6.30.8

                  Linux>>Linux_kernel >> Version 2.6.30.9

                  Linux>>Linux_kernel >> Version 2.6.30.y

                    References

                    http://www.securityfocus.com/bid/37453
                    Tags : vdb-entry, x_refsource_BID
                    http://secunia.com/advisories/37928
                    Tags : third-party-advisory, x_refsource_SECUNIA
                    http://www.openwall.com/lists/oss-security/2009/12/23/1
                    Tags : mailing-list, x_refsource_MLIST
                    http://osvdb.org/61335
                    Tags : vdb-entry, x_refsource_OSVDB