Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause …
Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.
The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.
https://cwe.mitre.org/data/definitions/129.html →Open in CWE collection →The product checks a value to ensure that it is less than or equal to a maximum, but it does not also verify that the value is greater than or equal to the minimum.
https://cwe.mitre.org/data/definitions/839.html →Open in CWE collection →Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the adversaries' choice.
https://capec.mitre.org/data/definitions/100.html →Open in CAPEC collection →| Product | Vendor | Status |
|---|---|---|
| kernel | Tracked | |
| kernel | Tracked | |
| kernel | Tracked | |
| kernel-rt | Tracked | |
| linux | Tracked | |
| linux-2.6 | Tracked | |
| linux-2.6 | Tracked | |
| linux-2.6.24 | Tracked | |
| debian_linux | * | Tracked |
| enterprise_linux_desktop | * | Tracked |
| enterprise_linux_eus | * | Tracked |
| enterprise_linux_server | * | Tracked |
| enterprise_linux_server_workstation | * | Tracked |
| esx | * | Tracked |
| fedora | * | Tracked |
| linux_enterprise_desktop | * | Tracked |
| linux_enterprise_server | * | Tracked |
| linux_kernel | * | Tracked |
| opensuse | * | Tracked |
| ubuntu_linux | * | Tracked |