4.9
CVE-2009-0745
- EPSS 0.06%
- Published 27.02.2009 17:30:09
- Last modified 09.04.2025 00:30:58
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
The ext4_group_add function in fs/ext4/resize.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not properly initialize the group descriptor during a resize (aka resize2fs) operation, which might allow local users to cause a denial of service (OOPS) by arranging for crafted values to be present in available memory.
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version2.6.27
Linux ≫ Linux Kernel Version2.6.27.1
Linux ≫ Linux Kernel Version2.6.27.2
Linux ≫ Linux Kernel Version2.6.27.3
Linux ≫ Linux Kernel Version2.6.27.4
Linux ≫ Linux Kernel Version2.6.27.5
Linux ≫ Linux Kernel Version2.6.27.6
Linux ≫ Linux Kernel Version2.6.27.7
Linux ≫ Linux Kernel Version2.6.27.8
Linux ≫ Linux Kernel Version2.6.27.9
Linux ≫ Linux Kernel Version2.6.27.10
Linux ≫ Linux Kernel Version2.6.27.11
Linux ≫ Linux Kernel Version2.6.27.12
Linux ≫ Linux Kernel Version2.6.27.13
Linux ≫ Linux Kernel Version2.6.27.14
Linux ≫ Linux Kernel Version2.6.27.15
Linux ≫ Linux Kernel Version2.6.27.16
Linux ≫ Linux Kernel Version2.6.27.17
Linux ≫ Linux Kernel Version2.6.27.18
Linux ≫ Linux Kernel Version2.6.28
Linux ≫ Linux Kernel Version2.6.28.1
Linux ≫ Linux Kernel Version2.6.28.2
Linux ≫ Linux Kernel Version2.6.28.3
Linux ≫ Linux Kernel Version2.6.28.4
Linux ≫ Linux Kernel Version2.6.28.5
Linux ≫ Linux Kernel Version2.6.28.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.171 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.9 | 3.9 | 6.9 |
AV:L/AC:L/Au:N/C:N/I:N/A:C
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.