Vulnerability Details : CVE-2008-4302
Potential exploit
fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a denial of service (kernel BUG and system crash), as demonstrated by the fio I/O tool.
Vulnerability category: Denial of service
Products affected by CVE-2008-4302
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Threat overview for CVE-2008-4302
Top countries where our scanners detected CVE-2008-4302
Top open port discovered on systems with this issue
52869
IPs affected by CVE-2008-4302 188,681
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2008-4302!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2008-4302
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 32 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-4302
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
3.9
|
6.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | 2024-02-15 |
CWE ids for CVE-2008-4302
-
Assigned by: nvd@nist.gov (Primary)
-
The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.Assigned by: nvd@nist.gov (Primary)
-
The product does not handle or incorrectly handles an exceptional condition.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2008-4302
-
Red Hat 2009-01-15This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG. It was addressed in Red Hat Enterprise Linux 5 via: https://rhn.redhat.com/errata/RHSA-2008-0957.html
References for CVE-2008-4302
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10547
404 Not FoundBroken Link
-
http://secunia.com/advisories/32485
About Secunia Research | FlexeraBroken Link
-
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git;a=commit;h=6a860c979b35469e4d77da781a96bdb2ca05ae64
Broken Link
-
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.2
404: File not foundBroken Link
-
http://www.openwall.com/lists/oss-security/2008/09/16/10
oss-security - CVE request: kernel: splice: fix bad unlock_page() in error caseMailing List;Third Party Advisory
-
http://lkml.org/lkml/2007/7/20/168
LKML: Jens Axboe: [PATCH] splice: fix bad unlock_page() in error caseExploit;Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2008:025 - openSUSE Security Announce - openSUSE Mailing ListsMailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/31201
Broken Link;Third Party Advisory;VDB Entry
-
http://www.juniper.net/security/auto/vulnerabilities/vuln31201.html
404 Not FoundBroken Link
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/45191
Linux Kernel add_to_page_cache_lru() denial of service CVE-2008-4302 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://www.redhat.com/support/errata/RHSA-2008-0957.html
SupportBroken Link
-
http://secunia.com/advisories/32759
About Secunia Research | FlexeraBroken Link
-
http://www.debian.org/security/2008/dsa-1653
Debian -- Security Information -- DSA-1653-1 linux-2.6Third Party Advisory
-
http://secunia.com/advisories/32237
About Secunia Research | FlexeraBroken Link
-
https://bugzilla.redhat.com/show_bug.cgi?id=462434
462434 – (CVE-2008-4302) CVE-2008-4302 kernel: splice: fix bad unlock_page() in error caseIssue Tracking;Patch;Third Party Advisory
-
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=6a860c979b35469e4d77da781a96bdb2ca05ae64
Broken Link
Jump to