CVE-2008-2729

Current Description

arch/x86_64/lib/copy_user.S in the Linux kernel before 2.6.19 on some AMD64 systems does not erase destination memory locations after an exception during kernel memory copy, which allows local users to obtain sensitive information.

Basic Data

PublishedJune 30, 2008
Last ModifiedSeptember 29, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-200
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:N/A:N
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score4.9
SeverityMEDIUM
Exploitability Score3.9
Impact Score6.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSRed HatLinux Kernel2.6.0*******
    2.3OSRed HatLinux Kernel2.6.1*******
    2.3OSRed HatLinux Kernel2.6.2*******
    2.3OSRed HatLinux Kernel2.6.3*******
    2.3OSRed HatLinux Kernel2.6.4*******
    2.3OSRed HatLinux Kernel2.6.5*******
    2.3OSRed HatLinux Kernel2.6.6*******
    2.3OSRed HatLinux Kernel2.6.7*******
    2.3OSRed HatLinux Kernel2.6.8*******
    2.3OSRed HatLinux Kernel2.6.9*******
    2.3OSRed HatLinux Kernel2.6.10*******
    2.3OSRed HatLinux Kernel2.6.11*******
    2.3OSRed HatLinux Kernel2.6.12*******
    2.3OSRed HatLinux Kernel2.6.13*******
    2.3OSRed HatLinux Kernel2.6.14*******
    2.3OSRed HatLinux Kernel2.6.15*******
    2.3OSRed HatLinux Kernel2.6.16*******
    2.3OSRed HatLinux Kernel2.6.17*******
    2.3OSRed HatLinux Kernel2.6.18*******

Vulnerable Software List

VendorProductVersions
Red Hat Linux Kernel 2.6.0, 2.6.1, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9

References

NameSourceURLTags
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=3022d734a54cbd2b65eea9a024564821101b4a9a;hp=f0f4c3432e5e1087b3a8c0e6bd4113d3c37497ffhttp://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=3022d734a54cbd2b65eeCONFIRMExploit
RHSA-2008:0508http://rhn.redhat.com/errata/RHSA-2008-0508.htmlREDHAT
30849http://secunia.com/advisories/30849SECUNIA
30850http://secunia.com/advisories/30850SECUNIA
31107http://secunia.com/advisories/31107SECUNIA
31551http://secunia.com/advisories/31551SECUNIA
31628http://secunia.com/advisories/31628SECUNIA
DSA-1630http://www.debian.org/security/2008/dsa-1630DEBIAN
MDVSA-2008:174http://www.mandriva.com/security/advisories?name=MDVSA-2008:174MANDRIVA
RHSA-2008:0519http://www.redhat.com/support/errata/RHSA-2008-0519.htmlREDHAT
RHSA-2008:0585http://www.redhat.com/support/errata/RHSA-2008-0585.htmlREDHAT
29943http://www.securityfocus.com/bid/29943BID
1020364http://www.securitytracker.com/id?1020364SECTRACK
USN-625-1http://www.ubuntu.com/usn/usn-625-1UBUNTU
https://bugzilla.redhat.com/show_bug.cgi?id=451271https://bugzilla.redhat.com/show_bug.cgi?id=451271CONFIRM
linux-kernel-destination-info-disclosure(43558)https://exchange.xforce.ibmcloud.com/vulnerabilities/43558XF
oval:org.mitre.oval:def:11571https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11571OVAL