Executive Summary

Informations
Name CVE-2008-4302 First vendor Publication 2008-09-29
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 4.9 Attack Range Local
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a denial of service (kernel BUG and system crash), as demonstrated by the fio I/O tool.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4302

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-667 Insufficient Locking

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10547
 
Oval ID: oval:org.mitre.oval:def:10547
Title: fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a denial of service (kernel BUG and system crash), as demonstrated by the fio I/O tool.
Description: fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a denial of service (kernel BUG and system crash), as demonstrated by the fio I/O tool.
Family: unix Class: vulnerability
Reference(s): CVE-2008-4302
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20290
 
Oval ID: oval:org.mitre.oval:def:20290
Title: DSA-1653-1 fai-kernels linux-2.6 user-mode-linux - several vulnerabilities
Description: Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation.
Family: unix Class: patch
Reference(s): DSA-1653-1
CVE-2007-6716
CVE-2008-1514
CVE-2008-3276
CVE-2008-3525
CVE-2008-3833
CVE-2008-4210
CVE-2008-4302
Version: 7
Platform(s): Debian GNU/Linux 4.0
Product(s): fai-kernels
linux-2.6
user-mode-linux
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21746
 
Oval ID: oval:org.mitre.oval:def:21746
Title: ELSA-2008:0957: kernel security and bug fix update (Important)
Description: fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a denial of service (kernel BUG and system crash), as demonstrated by the fio I/O tool.
Family: unix Class: patch
Reference(s): ELSA-2008:0957-03
CVE-2006-5755
CVE-2007-5907
CVE-2008-2372
CVE-2008-3276
CVE-2008-3527
CVE-2008-3833
CVE-2008-4210
CVE-2008-4302
Version: 37
Platform(s): Oracle Linux 5
Product(s): kernel
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:29265
 
Oval ID: oval:org.mitre.oval:def:29265
Title: RHSA-2008:0957 -- kernel security and bug fix update (Important)
Description: Updated kernel packages that resolve several security issues and fix various bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The original packages distributed with this errata had a bug which prevented the Xen kernel booting on older hardware. We have updated the packages to correct this bug.
Family: unix Class: patch
Reference(s): RHSA-2008:0957
CESA-2008:0957-CentOS 5
CVE-2006-5755
CVE-2007-5907
CVE-2008-2372
CVE-2008-3276
CVE-2008-3527
CVE-2008-3833
CVE-2008-4210
CVE-2008-4302
Version: 3
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): kernel
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:7921
 
Oval ID: oval:org.mitre.oval:def:7921
Title: DSA-1653 linux-2.6 -- denial of service/privilege escalation
Description: Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems: Joe Jin reported a local denial of service vulnerability that allows system users to trigger an oops due to an improperly initialised data structure. Jan Kratochvil reported a local denial of service vulnerability in the ptrace interface for the s390 architecture. Local users can trigger an invalid pointer dereference, leading to a system panic. Eugene Teo reported an integer overflow in the DCCP subsystem that may allow remote attackers to cause a denial of service in the form of a kernel panic. Eugene Teo reported a lack of capability checks in the kernel driver for Granch SBNI12 leased line adapters (sbni), allowing local users to perform privileged operations. The S_ISUID/S_ISGID bits were not being cleared during an inode splice, which, under certain conditions, can be exploited by local users to obtain the privileges of a group for which they are not a member. Mark Fasheh reported this issue. David Watson reported an issue in the open()/creat() system calls which, under certain conditions, can be exploited by local users to obtain the privileges of a group for which they are not a member. A coding error in the splice subsystem allows local users to attempt to unlock a page structure that has not been locked, resulting in a system crash.
Family: unix Class: patch
Reference(s): DSA-1653
CVE-2007-6716
CVE-2008-1514
CVE-2008-3276
CVE-2008-3525
CVE-2008-3833
CVE-2008-4210
CVE-2008-4302
Version: 5
Platform(s): Debian GNU/Linux 4.0
Product(s): linux-2.6
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 1
Os 891
Os 1

OpenVAS Exploits

Date Description
2009-03-06 Name : RedHat Update for kernel RHSA-2008:0957-02
File : nvt/gb_RHSA-2008_0957-02_kernel.nasl
2008-11-01 Name : Debian Security Advisory DSA 1653-1 (linux-2.6)
File : nvt/deb_1653_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
49898 Linux Kernel splice Subsystem fs/splice.c add_to_page_cache_lru Function Loca...

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2008-0957.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20081104_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2010-01-06 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2008-0957.nasl - Type : ACT_GATHER_INFO
2008-11-12 Name : The remote openSUSE host is missing a security update.
File : suse_kernel-5751.nasl - Type : ACT_GATHER_INFO
2008-11-04 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2008-0957.nasl - Type : ACT_GATHER_INFO
2008-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1653.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commi...
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.2
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
http://lkml.org/lkml/2007/7/20/168
http://secunia.com/advisories/32237
http://secunia.com/advisories/32485
http://secunia.com/advisories/32759
http://www.debian.org/security/2008/dsa-1653
http://www.juniper.net/security/auto/vulnerabilities/vuln31201.html
http://www.openwall.com/lists/oss-security/2008/09/16/10
http://www.redhat.com/support/errata/RHSA-2008-0957.html
http://www.securityfocus.com/bid/31201
https://bugzilla.redhat.com/show_bug.cgi?id=462434
https://exchange.xforce.ibmcloud.com/vulnerabilities/45191
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
Date Informations
2024-11-28 23:13:24
  • Multiple Updates
2024-11-28 12:16:36
  • Multiple Updates
2024-08-02 12:09:52
  • Multiple Updates
2024-08-02 01:02:48
  • Multiple Updates
2024-02-16 05:28:19
  • Multiple Updates
2024-02-02 01:09:25
  • Multiple Updates
2024-02-01 12:02:46
  • Multiple Updates
2023-11-07 21:47:49
  • Multiple Updates
2023-11-03 17:28:12
  • Multiple Updates
2023-09-05 12:08:47
  • Multiple Updates
2023-09-05 01:02:38
  • Multiple Updates
2023-09-02 12:08:54
  • Multiple Updates
2023-09-02 01:02:38
  • Multiple Updates
2023-08-12 12:10:30
  • Multiple Updates
2023-08-12 01:02:38
  • Multiple Updates
2023-08-11 12:08:56
  • Multiple Updates
2023-08-11 01:02:44
  • Multiple Updates
2023-08-06 12:08:33
  • Multiple Updates
2023-08-06 01:02:40
  • Multiple Updates
2023-08-04 12:08:39
  • Multiple Updates
2023-08-04 01:02:43
  • Multiple Updates
2023-07-14 12:08:38
  • Multiple Updates
2023-07-14 01:02:40
  • Multiple Updates
2023-03-29 01:09:50
  • Multiple Updates
2023-03-28 12:02:46
  • Multiple Updates
2022-10-11 12:07:40
  • Multiple Updates
2022-10-11 01:02:30
  • Multiple Updates
2022-03-11 01:06:30
  • Multiple Updates
2021-05-04 12:08:06
  • Multiple Updates
2021-04-22 01:08:27
  • Multiple Updates
2020-08-08 01:03:43
  • Multiple Updates
2020-07-30 01:03:53
  • Multiple Updates
2020-05-24 01:04:49
  • Multiple Updates
2020-05-23 00:22:19
  • Multiple Updates
2019-01-25 12:02:29
  • Multiple Updates
2018-10-30 12:02:38
  • Multiple Updates
2017-09-29 09:23:44
  • Multiple Updates
2017-08-08 09:24:24
  • Multiple Updates
2016-08-05 12:01:51
  • Multiple Updates
2016-06-29 00:01:19
  • Multiple Updates
2016-06-28 17:18:35
  • Multiple Updates
2016-04-26 17:51:50
  • Multiple Updates
2014-02-17 10:46:46
  • Multiple Updates
2013-05-11 00:27:09
  • Multiple Updates