CVE-2008-2931

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The do_change_type function in fs/namespace.c in the Linux kernel before 2.6.22 does not verify that the caller has the CAP_SYS_ADMIN capability, which allows local users to gain privileges or cause a denial of service by modifying the properties of a mountpoint.

References

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=ee6f958291e2a768fd727e7a67badfff0b67711a

http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22

http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html

http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html

http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html

http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html

http://secunia.com/advisories/30982

http://secunia.com/advisories/31551

http://secunia.com/advisories/31614

http://secunia.com/advisories/32023

http://secunia.com/advisories/32759

http://www.debian.org/security/2008/dsa-1630

http://www.openwall.com/lists/oss-security/2008/07/08/3

http://www.openwall.com/lists/oss-security/2008/07/08/4

http://www.redhat.com/support/errata/RHSA-2008-0885.html

http://www.securityfocus.com/bid/30126

https://bugzilla.redhat.com/show_bug.cgi?id=454388

https://exchange.xforce.ibmcloud.com/vulnerabilities/43696

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10437

https://usn.ubuntu.com/637-1/

Details

Source: MITRE

Published: 2008-07-09

Updated: 2020-08-06

Type: CWE-269

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

CVSS v3

Base Score: 7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1.8

Severity: HIGH

Tenable Plugins

View all (13 total)

IDNameProductFamilySeverity
79448OracleVM 2.1 : kernel (OVMSA-2008-2006)NessusOracleVM Local Security Checks
high
67747Oracle Linux 5 : kernel (ELSA-2008-0885)NessusOracle Linux Local Security Checks
high
60477Scientific Linux Security Update : kernel on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
high
59131SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5608)NessusSuSE Local Security Checks
critical
59129SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5477)NessusSuSE Local Security Checks
critical
43710CentOS 5 : kernel (CESA-2008:0885)NessusCentOS Local Security Checks
high
41533SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5473)NessusSuSE Local Security Checks
critical
34755openSUSE 10 Security Update : kernel (kernel-5751)NessusSuSE Local Security Checks
critical
34331SuSE 10 Security Update : the Linux Kernel (x86) (ZYPP Patch Number 5566)NessusSuSE Local Security Checks
critical
34288RHEL 5 : kernel (RHSA-2008:0885)NessusRed Hat Local Security Checks
high
34048Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : linux, linux-source-2.6.15/20/22 vulnerabilities (USN-637-1)NessusUbuntu Local Security Checks
high
34032Debian DSA-1630-1 : linux-2.6 - denial of service/information leakNessusDebian Local Security Checks
high
801457CentOS RHSA-2008-0885 Security CheckLog Correlation EngineGeneric
high