6.9
CVSSv2

CVE-2008-1669

Published: 08/05/2008 Updated: 30/10/2018
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Linux kernel prior to 2.6.25.2 does not apply a certain protection mechanism for fcntl functionality, which allows local users to (1) execute code in parallel or (2) exploit a race condition to obtain "re-ordered access to the descriptor table."

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.11

linux linux kernel 2.6.20.6

linux linux kernel 2.6.4

linux linux kernel 2.6.17

linux linux kernel 2.6.20.9

linux linux kernel 2.6.18

linux linux kernel 2.6.23.4

linux linux kernel 2.6.16.16

linux linux kernel 2.6.20

linux linux kernel 2.6.18.7

linux linux kernel 2.6.17.12

linux linux kernel 2.6.16.39

linux linux kernel 2.6.21

linux linux kernel 2.6.16.9

linux linux kernel 2.6.12

linux linux kernel 2.6.17.9

linux linux kernel 2.6.12.12

linux linux kernel 2.6.19

linux linux kernel 2.6.14

linux linux kernel 2.6.11.2

linux linux kernel 2.6.5

linux linux kernel 2.6.15.3

linux linux kernel 2.6.11.10

linux linux kernel 2.6.10

linux linux kernel 2.6.13

linux linux kernel 2.6.1

linux linux kernel 2.6.16.43

linux linux kernel 2.6.16.6

linux linux kernel 2.6.16.8

linux linux kernel 2.6.16

linux linux kernel 2.6.20.13

linux linux kernel 2.6.22.4

linux linux kernel 2.6.7

linux linux kernel 2.6.14.7

linux linux kernel 2.6.3

linux linux kernel 2.6.17.2

linux linux kernel 2.6.15

linux linux kernel 2.6.13.3

linux linux kernel 2.6.11.8

linux linux kernel 2.6.24.2

linux linux kernel 2.6.16.34

linux linux kernel 2.6.11 rc1 bk6

linux linux kernel 2.6.23.7

linux linux kernel 2.6.17.8

linux linux kernel 2.6.14.4

linux linux kernel 2.6.17.4

linux linux kernel 2.6.16.18

linux linux kernel 2.6.17.14

linux linux kernel 2.6.16.45

linux linux kernel 2.6.14.3

linux linux kernel 2.6.24

linux linux kernel 2.6.18.3

linux linux kernel 2.6.16.37

linux linux kernel 2.6.11.6

linux linux kernel 2.6.16.48

linux linux kernel 2.6.11.11

linux linux kernel 2.6.0

linux linux kernel 2.6.16.13

linux linux kernel 2.6.22.1

linux linux kernel 2.6.9

linux linux kernel 2.6.16.4

linux linux kernel 2.6.17.3

linux linux kernel 2.6.24.1

linux linux kernel 2.6.20.5

linux linux kernel 2.6.22

linux linux kernel 2.6.16.15

linux linux kernel 2.6 test9 cvs

linux linux kernel 2.6.15.6

linux linux kernel 2.6.15.1

linux linux kernel 2.6.11.5

linux linux kernel 2.6.19.3

linux linux kernel 2.6.19.1

linux linux kernel 2.6.18.4

linux linux kernel 2.6.16.1

linux linux kernel 2.6.18.1

linux linux kernel 2.6.8

linux linux kernel 2.6.23.1

linux linux kernel 2.6.2

linux linux kernel 2.6.6

linux linux kernel 2.6.14.5

linux linux kernel 2.6.13.2

linux linux kernel 2.6.17.5

linux linux kernel 2.6.8.1.5

linux linux kernel 2.6.18.5

linux linux kernel 2.6.21.1

linux linux kernel 2.6.16.32

linux linux kernel 2.6.13.5

linux linux kernel 2.6.16.49

linux linux kernel 2.6.19.2

linux linux kernel 2.6.21.4

linux linux kernel 2.6.16.11

linux linux kernel 2.6.16.14

linux linux kernel 2.6.20.12

linux linux kernel 2.6.16.25

linux linux kernel 2.6.16.21

linux linux kernel 2.6.16.33

linux linux kernel 2.6.16.28

linux linux kernel 2.6.17.10

linux linux kernel 2.6.15.11

linux linux kernel 2.6.14.1

linux linux kernel 2.6.16.23

linux linux kernel 2.6.12.5

linux linux kernel 2.6.15.7

linux linux kernel 2.6.22.7

linux linux kernel 2.6.16.3

linux linux kernel 2.6.16.36

linux linux kernel 2.6.14.6

linux linux kernel 2.6.12.1

linux linux kernel 2.6.11.9

linux linux kernel 2.6.16.46

linux linux kernel 2.6.17.1

linux linux kernel 2.6.20.8

linux linux kernel 2.6.20.15

linux linux kernel 2.6.13.4

linux linux kernel 2.6.23

linux linux kernel 2.6.23.9

linux linux kernel 2.6.22.6

linux linux kernel 2.6.23.3

linux linux kernel 2.6.18.8

linux linux kernel 2.6.22.3

linux linux kernel 2.6.12.2

linux linux kernel 2.6.16.31

linux linux kernel 2.6.16.26

linux linux kernel 2.6.18.2

linux linux kernel 2.6.16.29

linux linux kernel 2.6.24.4

linux linux kernel 2.6.20.11

linux linux kernel 2.6.20.3

linux linux kernel 2.6.21.3

linux linux kernel 2.6.24.5

linux linux kernel 2.6.16.51

linux linux kernel 2.6.15.2

linux linux kernel 2.6.16.22

linux linux kernel 2.6.16.40

linux linux kernel 2.6.16.47

linux linux kernel 2.6.23.14

linux linux kernel 2.6.17.11

linux linux kernel 2.6.16.10

linux linux kernel 2.6.12.4

linux linux kernel 2.6.16.41

linux linux kernel 2.6.16.52

linux linux kernel 2.6.11.3

linux linux kernel 2.6.20.10

linux linux kernel 2.6.16.24

linux linux kernel 2.6.12.3

linux linux kernel 2.6.23.2

linux linux kernel 2.6.25.1

linux linux kernel 2.6.16 rc7

linux linux kernel 2.6.16.30

linux linux kernel 2.6.21.2

linux linux kernel 2.6.15.4

linux linux kernel 2.6.16.38

linux linux kernel 2.6.16.17

linux linux kernel 2.6.20.2

linux linux kernel 2.6.16.12

linux linux kernel 2.6.16.27

linux linux kernel 2.6.16.53

linux linux kernel 2.6.12.6

linux linux kernel 2.6.17.7

linux linux kernel 2.6.20.1

linux linux kernel 2.6.11.7

linux linux kernel 2.6.16.2

linux linux kernel 2.6.18.6

linux linux kernel 2.6.16.44

linux linux kernel 2.6.12.22

linux linux kernel 2.6.16.35

linux linux kernel 2.6.16.50

linux linux kernel 2.6.23.5

linux linux kernel 2.6.14.2

linux linux kernel 2.6.20.4

linux linux kernel 2.6.17.6

linux linux kernel 2.6.23.6

linux linux kernel 2.6.16.7

linux linux kernel 2.6.17.13

linux linux kernel 2.6.8.1

linux linux kernel 2.6.24.3

linux linux kernel 2.6.25

linux linux kernel 2.6.20.14

linux linux kernel 2.6.22.5

linux linux kernel 2.6.20.7

linux linux kernel 2.6.16.5

linux linux kernel 2.6.11.4

linux linux kernel 2.6.16.19

linux linux kernel 2.6.11.12

linux linux kernel 2.6.16.20

linux linux kernel 2.6.15.5

linux linux kernel 2.6.22.16

linux linux kernel 2.6.11.1

linux linux kernel 2.6.13.1

Vendor Advisories

It was discovered that PowerPC kernels did not correctly handle reporting certain system details By requesting a specific set of information, a local attacker could cause a system crash resulting in a denial of service (CVE-2007-6694) ...
It was discovered that the ALSA /proc interface did not write the correct number of bytes when reporting memory allocations A local attacker might be able to access sensitive kernel memory, leading to a loss of privacy (CVE-2007-4571) ...
A vulnerability has been discovered in the Linux kernel that may lead to a denial of service The Common Vulnerabilities and Exposures project identifies the following problem: CVE-2008-1669 Alexander Viro discovered a race condition in the fcntl code that may permit local users on multi-processor systems to execute parallel code paths ...

References

CWE-94CWE-362http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.2http://www.redhat.com/support/errata/RHSA-2008-0211.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0233.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0237.htmlhttp://www.securityfocus.com/bid/29076http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0162https://issues.rpath.com/browse/RPL-2518http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.4http://www.debian.org/security/2008/dsa-1575https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00232.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-May/msg00294.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-May/msg00357.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:105http://www.securitytracker.com/id?1019974http://secunia.com/advisories/30077http://secunia.com/advisories/30108http://secunia.com/advisories/30260http://secunia.com/advisories/30276http://secunia.com/advisories/30252http://secunia.com/advisories/30164http://secunia.com/advisories/30515http://secunia.com/advisories/30962http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.htmlhttp://secunia.com/advisories/30769http://secunia.com/advisories/30818http://www.mandriva.com/security/advisories?name=MDVSA-2008:167http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.htmlhttp://www.ubuntu.com/usn/usn-618-1http://secunia.com/advisories/31246http://lists.vmware.com/pipermail/security-announce/2008/000023.htmlhttp://secunia.com/advisories/30112http://secunia.com/advisories/30110http://www.mandriva.com/security/advisories?name=MDVSA-2008:104http://secunia.com/advisories/30116http://secunia.com/advisories/30101http://www.vupen.com/english/advisories/2008/1452/referenceshttp://www.vupen.com/english/advisories/2008/2222/referenceshttp://www.vupen.com/english/advisories/2008/1451/referenceshttp://secunia.com/advisories/30982https://exchange.xforce.ibmcloud.com/vulnerabilities/42242https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10065https://usn.ubuntu.com/614-1/http://www.securityfocus.com/archive/1/491740/100/0/threadedhttps://nvd.nist.govhttps://usn.ubuntu.com/614-1/