Upstream information

CVE-2008-4554 at MITRE

Description

The do_splice_from function in fs/splice.c in the Linux kernel before 2.6.27 does not reject file descriptors that have the O_APPEND flag set, which allows local users to bypass append mode and make arbitrary changes to other locations in the file.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.6
Vector AV:L/AC:L/Au:N/C:P/I:P/A:P
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 435151 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 11.0
  • kernel-debug-debuginfo >= 2.6.25.20-0.1
  • kernel-debug-debugsource >= 2.6.25.20-0.1
  • kernel-default-debuginfo >= 2.6.25.20-0.1
  • kernel-default-debugsource >= 2.6.25.20-0.1
  • kernel-kdump-debuginfo >= 2.6.25.20-0.1
  • kernel-kdump-debugsource >= 2.6.25.20-0.1
  • kernel-pae-debuginfo >= 2.6.25.20-0.1
  • kernel-pae-debugsource >= 2.6.25.20-0.1
  • kernel-ppc64-debuginfo >= 2.6.25.20-0.1
  • kernel-ppc64-debugsource >= 2.6.25.20-0.1
  • kernel-ps3-debuginfo >= 2.6.25.20-0.1
  • kernel-ps3-debugsource >= 2.6.25.20-0.1
  • kernel-rt-debuginfo >= 2.6.25.20-0.1
  • kernel-rt-debugsource >= 2.6.25.20-0.1
  • kernel-rt_debug-debuginfo >= 2.6.25.20-0.1
  • kernel-rt_debug-debugsource >= 2.6.25.20-0.1
  • kernel-source-debuginfo >= 2.6.25.20-0.1
  • kernel-vanilla-debuginfo >= 2.6.25.20-0.1
  • kernel-vanilla-debugsource >= 2.6.25.20-0.1
  • kernel-xen-debuginfo >= 2.6.25.20-0.1
  • kernel-xen-debugsource >= 2.6.25.20-0.1
openSUSE 11.0
  • kernel-debug >= 2.6.25.20-0.1
  • kernel-default >= 2.6.25.20-0.1
  • kernel-docs >= 2.6.25.20-0.1
  • kernel-kdump >= 2.6.25.20-0.1
  • kernel-pae >= 2.6.25.20-0.1
  • kernel-ppc64 >= 2.6.25.20-0.1
  • kernel-ps3 >= 2.6.25.20-0.1
  • kernel-rt >= 2.6.25.20-0.1
  • kernel-rt_debug >= 2.6.25.20-0.1
  • kernel-source >= 2.6.25.20-0.1
  • kernel-syms >= 2.6.25.20-0.1
  • kernel-vanilla >= 2.6.25.20-0.1
  • kernel-xen >= 2.6.25.20-0.1
SUSE Linux Enterprise Realtime 10 SP2
  • ib-bonding-kmp-rt >= 0.9.0_2.6.22.19_0.21-1.20
  • ib-bonding-kmp-rt_bigsmp >= 0.9.0_2.6.22.19_0.21-1.20
  • ib-bonding-kmp-rt_debug >= 0.9.0_2.6.22.19_0.21-1.20
  • ib-bonding-kmp-rt_timing >= 0.9.0_2.6.22.19_0.21-1.20
  • kernel-rt >= 2.6.22.19-0.21
  • kernel-rt_bigsmp >= 2.6.22.19-0.21
  • kernel-rt_debug >= 2.6.22.19-0.21
  • kernel-rt_timing >= 2.6.22.19-0.21
  • kernel-source >= 2.6.22.19-0.21
  • kernel-syms >= 2.6.22.19-0.21
  • ofed >= 1.3-0.32
  • ofed-cxgb3-NIC-kmp-rt >= 1.3_2.6.22.19_0.21-0.17
  • ofed-cxgb3-NIC-kmp-rt_bigsmp >= 1.3_2.6.22.19_0.21-0.17
  • ofed-cxgb3-NIC-kmp-rt_debug >= 1.3_2.6.22.19_0.21-0.17
  • ofed-cxgb3-NIC-kmp-rt_timing >= 1.3_2.6.22.19_0.21-0.17
  • ofed-doc >= 1.3-0.32
  • ofed-kmp-rt >= 1.3_2.6.22.19_0.21-0.32
  • ofed-kmp-rt_bigsmp >= 1.3_2.6.22.19_0.21-0.32
  • ofed-kmp-rt_debug >= 1.3_2.6.22.19_0.21-0.32
  • ofed-kmp-rt_timing >= 1.3_2.6.22.19_0.21-0.32
sles10-sp2.x86-64
sles10-sp2.x86
ZYPP Patch Nr: 6183
SUSE Linux Enterprise Realtime 10 SP2
  • ib-bonding-kmp-rt >= 0.9.0_2.6.22.19_0.21-1.20
  • ib-bonding-kmp-rt_debug >= 0.9.0_2.6.22.19_0.21-1.20
  • ib-bonding-kmp-rt_timing >= 0.9.0_2.6.22.19_0.21-1.20
  • kernel-rt >= 2.6.22.19-0.21
  • kernel-rt_debug >= 2.6.22.19-0.21
  • kernel-rt_timing >= 2.6.22.19-0.21
  • kernel-source >= 2.6.22.19-0.21
  • kernel-syms >= 2.6.22.19-0.21
  • ofed >= 1.3-0.32
  • ofed-cxgb3-NIC-kmp-rt >= 1.3_2.6.22.19_0.21-0.17
  • ofed-cxgb3-NIC-kmp-rt_debug >= 1.3_2.6.22.19_0.21-0.17
  • ofed-cxgb3-NIC-kmp-rt_timing >= 1.3_2.6.22.19_0.21-0.17
  • ofed-doc >= 1.3-0.32
  • ofed-kmp-rt >= 1.3_2.6.22.19_0.21-0.32
  • ofed-kmp-rt_debug >= 1.3_2.6.22.19_0.21-0.32
  • ofed-kmp-rt_timing >= 1.3_2.6.22.19_0.21-0.32
sles10-sp2.x86-64
sles10-sp2.x86
ZYPP Patch Nr: 6183