#VU95209 Improper control of generation of code ('code injection') in Linux kernel - CVE-2008-0600 

 

#VU95209 Improper control of generation of code ('code injection') in Linux kernel - CVE-2008-0600

Published: February 12, 2008 / Updated: February 13, 2023


Vulnerability identifier: #VU95209
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2008-0600
CWE-ID: CWE-94
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Linux kernel
Software vendor:
Linux Foundation

Description

The vulnerability allows a local user to execute arbitrary code.

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.


Remediation

Install update from vendor's repository.

External links