6.9
CVSSv2

CVE-2008-1669

Published: 08/05/2008 Updated: 30/10/2018
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Linux kernel prior to 2.6.25.2 does not apply a certain protection mechanism for fcntl functionality, which allows local users to (1) execute code in parallel or (2) exploit a race condition to obtain "re-ordered access to the descriptor table."

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.24.4

linux linux kernel 2.6.24.5

linux linux kernel 2.6.0

linux linux kernel 2.6.1

linux linux kernel 2.6.11.1

linux linux kernel 2.6.11.10

linux linux kernel 2.6.11.7

linux linux kernel 2.6.11.8

linux linux kernel 2.6.11_rc1_bk6

linux linux kernel 2.6.12

linux linux kernel 2.6.12.5

linux linux kernel 2.6.12.6

linux linux kernel 2.6.13.1

linux linux kernel 2.6.13.2

linux linux kernel 2.6.13

linux linux kernel 2.6.14.5

linux linux kernel 2.6.14.6

linux linux kernel 2.6.15

linux linux kernel 2.6.15.1

linux linux kernel 2.6.15.7

linux linux kernel 2.6.16.1

linux linux kernel 2.6.16.10

linux linux kernel 2.6.16.17

linux linux kernel 2.6.16.18

linux linux kernel 2.6.16.24

linux linux kernel 2.6.16.25

linux linux kernel 2.6.16.32

linux linux kernel 2.6.24

linux linux kernel 2.6.24.1

linux linux kernel 2.6.10

linux linux kernel 2.6.11.3

linux linux kernel 2.6.11.4

linux linux kernel 2.6.11

linux linux kernel 2.6.12.2

linux linux kernel 2.6.12.22

linux linux kernel 2.6.13.5

linux linux kernel 2.6.14

linux linux kernel 2.6.14.1

linux linux kernel 2.6.15.3

linux linux kernel 2.6.15.4

linux linux kernel 2.6.16.13

linux linux kernel 2.6.16.14

linux linux kernel 2.6.16.20

linux linux kernel 2.6.16.21

linux linux kernel 2.6.16.28

linux linux kernel 2.6.16.29

linux linux kernel 2.6.16.3

linux linux kernel 2.6.16.36

linux linux kernel 2.6.16.37

linux linux kernel 2.6.16.44

linux linux kernel 2.6.16.45

linux linux kernel 2.6.16.52

linux linux kernel 2.6.16.53

linux linux kernel 2.6.16

linux linux kernel 2.6.17.11

linux linux kernel 2.6.17.12

linux linux kernel 2.6.17.7

linux linux kernel 2.6.17.8

linux linux kernel 2.6.17

linux linux kernel 2.6.18

linux linux kernel 2.6.18.7

linux linux kernel 2.6.18.8

linux linux kernel 2.6.19

linux linux kernel 2.6.19.1

linux linux kernel 2.6.2

linux linux kernel 2.6.20.12

linux linux kernel 2.6.20.13

linux linux kernel 2.6.20.7

linux linux kernel 2.6.20.8

linux linux kernel 2.6.21.4

linux linux kernel 2.6.21

linux linux kernel 2.6.22.4

linux linux kernel 2.6.22.5

linux linux kernel 2.6.23.2

linux linux kernel 2.6.23.3

linux linux kernel 2.6.4

linux linux kernel 2.6.6

linux linux kernel 2.6.8.1.5

linux linux kernel 2.6.8

linux linux kernel 2.6.9

linux linux kernel 2.6.16.33

linux linux kernel 2.6.16.4

linux linux kernel 2.6.16.40

linux linux kernel 2.6.16.48

linux linux kernel 2.6.16.49

linux linux kernel 2.6.16.8

linux linux kernel 2.6.16.9

linux linux kernel 2.6.16_rc7

linux linux kernel 2.6.17.2

linux linux kernel 2.6.17.3

linux linux kernel 2.6.17.4

linux linux kernel 2.6.18.3

linux linux kernel 2.6.18.4

linux linux kernel 2.6.20

linux linux kernel 2.6.20.1

linux linux kernel 2.6.20.3

linux linux kernel 2.6.20.4

linux linux kernel 2.6.21.1

linux linux kernel 2.6.22

linux linux kernel 2.6.22.1

linux linux kernel 2.6.23

linux linux kernel 2.6.23.6

linux linux kernel 2.6.23.7

linux linux kernel 2.6.3

linux linux kernel 2.6.5

linux linux kernel 2.6.7

linux linux kernel 2.6.24.2

linux linux kernel 2.6.24.3

linux linux kernel 2.6.25

linux linux kernel 2.6.25.1

linux linux kernel 2.6.11.11

linux linux kernel 2.6.11.12

linux linux kernel 2.6.11.2

linux linux kernel 2.6.11.9

linux linux kernel 2.6.12.1

linux linux kernel 2.6.12.12

linux linux kernel 2.6.13.3

linux linux kernel 2.6.13.4

linux linux kernel 2.6.14.7

linux linux kernel 2.6.15.11

linux linux kernel 2.6.15.2

linux linux kernel 2.6.16.11

linux linux kernel 2.6.16.12

linux linux kernel 2.6.16.19

linux linux kernel 2.6.16.2

linux linux kernel 2.6.16.26

linux linux kernel 2.6.16.27

linux linux kernel 2.6.16.34

linux linux kernel 2.6.16.35

linux linux kernel 2.6.16.41

linux linux kernel 2.6.16.43

linux linux kernel 2.6.16.5

linux linux kernel 2.6.16.50

linux linux kernel 2.6.16.51

linux linux kernel 2.6.17.1

linux linux kernel 2.6.17.10

linux linux kernel 2.6.17.5

linux linux kernel 2.6.17.6

linux linux kernel 2.6.18.5

linux linux kernel 2.6.18.6

linux linux kernel 2.6.20.10

linux linux kernel 2.6.20.11

linux linux kernel 2.6.20.5

linux linux kernel 2.6.20.6

linux linux kernel 2.6.21.2

linux linux kernel 2.6.21.3

linux linux kernel 2.6.22.16

linux linux kernel 2.6.22.3

linux linux kernel 2.6.23.1

linux linux kernel 2.6.23.14

linux linux kernel 2.6.23.9

linux linux kernel 2.6.8.1

linux linux kernel 2.6.11.5

linux linux kernel 2.6.11.6

linux linux kernel 2.6.12.3

linux linux kernel 2.6.12.4

linux linux kernel 2.6.14.2

linux linux kernel 2.6.14.3

linux linux kernel 2.6.14.4

linux linux kernel 2.6.15.5

linux linux kernel 2.6.15.6

linux linux kernel 2.6.16.15

linux linux kernel 2.6.16.16

linux linux kernel 2.6.16.22

linux linux kernel 2.6.16.23

linux linux kernel 2.6.16.30

linux linux kernel 2.6.16.31

linux linux kernel 2.6.16.38

linux linux kernel 2.6.16.39

linux linux kernel 2.6.16.46

linux linux kernel 2.6.16.47

linux linux kernel 2.6.16.6

linux linux kernel 2.6.16.7

linux linux kernel 2.6.17.13

linux linux kernel 2.6.17.14

linux linux kernel 2.6.17.9

linux linux kernel 2.6.18.1

linux linux kernel 2.6.18.2

linux linux kernel 2.6.19.2

linux linux kernel 2.6.19.3

linux linux kernel 2.6.20.14

linux linux kernel 2.6.20.15

linux linux kernel 2.6.20.2

linux linux kernel 2.6.20.9

linux linux kernel 2.6.22.6

linux linux kernel 2.6.22.7

linux linux kernel 2.6.23.4

linux linux kernel 2.6.23.5

linux linux kernel 2.6_test9_cvs

Vendor Advisories

It was discovered that the ALSA /proc interface did not write the correct number of bytes when reporting memory allocations A local attacker might be able to access sensitive kernel memory, leading to a loss of privacy (CVE-2007-4571) ...
It was discovered that PowerPC kernels did not correctly handle reporting certain system details By requesting a specific set of information, a local attacker could cause a system crash resulting in a denial of service (CVE-2007-6694) ...
A vulnerability has been discovered in the Linux kernel that may lead to a denial of service The Common Vulnerabilities and Exposures project identifies the following problem: CVE-2008-1669 Alexander Viro discovered a race condition in the fcntl code that may permit local users on multi-processor systems to execute parallel code paths ...

References

CWE-94CWE-362http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.2http://www.redhat.com/support/errata/RHSA-2008-0211.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0233.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0237.htmlhttp://www.securityfocus.com/bid/29076http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0162https://issues.rpath.com/browse/RPL-2518http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.4http://www.debian.org/security/2008/dsa-1575https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00232.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-May/msg00294.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-May/msg00357.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:105http://www.securitytracker.com/id?1019974http://secunia.com/advisories/30077http://secunia.com/advisories/30108http://secunia.com/advisories/30260http://secunia.com/advisories/30276http://secunia.com/advisories/30252http://secunia.com/advisories/30164http://secunia.com/advisories/30515http://secunia.com/advisories/30962http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.htmlhttp://secunia.com/advisories/30769http://secunia.com/advisories/30818http://www.mandriva.com/security/advisories?name=MDVSA-2008:167http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.htmlhttp://www.ubuntu.com/usn/usn-618-1http://secunia.com/advisories/31246http://lists.vmware.com/pipermail/security-announce/2008/000023.htmlhttp://secunia.com/advisories/30112http://secunia.com/advisories/30110http://www.mandriva.com/security/advisories?name=MDVSA-2008:104http://secunia.com/advisories/30116http://secunia.com/advisories/30101http://www.vupen.com/english/advisories/2008/1452/referenceshttp://www.vupen.com/english/advisories/2008/2222/referenceshttp://www.vupen.com/english/advisories/2008/1451/referenceshttp://secunia.com/advisories/30982https://exchange.xforce.ibmcloud.com/vulnerabilities/42242https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10065https://usn.ubuntu.com/614-1/http://www.securityfocus.com/archive/1/491740/100/0/threadedhttps://nvd.nist.govhttps://usn.ubuntu.com/618-1/