CVE-2008-4302

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a denial of service (kernel BUG and system crash), as demonstrated by the fio I/O tool.

References

http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git;a=commit;h=6a860c979b35469e4d77da781a96bdb2ca05ae64

http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.2

http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html

http://lkml.org/lkml/2007/7/20/168

http://secunia.com/advisories/32237

http://secunia.com/advisories/32485

http://secunia.com/advisories/32759

http://www.debian.org/security/2008/dsa-1653

http://www.juniper.net/security/auto/vulnerabilities/vuln31201.html

http://www.openwall.com/lists/oss-security/2008/09/16/10

http://www.redhat.com/support/errata/RHSA-2008-0957.html

http://www.securityfocus.com/bid/31201

https://bugzilla.redhat.com/show_bug.cgi?id=462434

https://exchange.xforce.ibmcloud.com/vulnerabilities/45191

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10547

Details

Source: MITRE

Published: 2008-09-29

Updated: 2017-09-29

Type: CWE-399

Risk Information

CVSS v2

Base Score: 4.9

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.9

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 2.6.22.1 (inclusive)

Tenable Plugins

View all (7 total)

IDNameProductFamilySeverity
67758Oracle Linux 5 : kernel (ELSA-2008-0957)NessusOracle Linux Local Security Checks
high
60488Scientific Linux Security Update : kernel on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
high
43713CentOS 5 : kernel (CESA-2008:0957)NessusCentOS Local Security Checks
high
34755openSUSE 10 Security Update : kernel (kernel-5751)NessusSuSE Local Security Checks
critical
34690RHEL 5 : kernel (RHSA-2008:0957)NessusRed Hat Local Security Checks
high
34392Debian DSA-1653-1 : linux-2.6 - denial of service/privilege escalationNessusDebian Local Security Checks
high
801458CentOS RHSA-2008-0957 Security CheckLog Correlation EngineGeneric
high