[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-4302Date: (C)2008-09-29   (M)2024-02-23


fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a denial of service (kernel BUG and system crash), as demonstrated by the fio I/O tool.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.5CVSS Score : 4.9
Exploit Score: 1.8Exploit Score: 3.9
Impact Score: 3.6Impact Score: 6.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: NONE
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: NONEAvailability: COMPLETE
Integrity: NONE 
Availability: HIGH 
  
Reference:
BID-31201
SECUNIA-32237
SECUNIA-32485
SECUNIA-32759
DSA-1653
RHSA-2008:0957
SUSE-SR:2008:025
http://lkml.org/lkml/2007/7/20/168
http://www.openwall.com/lists/oss-security/2008/09/16/10
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=6a860c979b35469e4d77da781a96bdb2ca05ae64
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.2
http://www.juniper.net/security/auto/vulnerabilities/vuln31201.html
https://bugzilla.redhat.com/show_bug.cgi?id=462434
linux-kernel-addtopagecachelru-dos(45191)
oval:org.mitre.oval:def:10547

CWE    1
CWE-667
OVAL    1
oval:org.mitre.oval:def:7921

© SecPod Technologies