National Cyber-Alert System
Vulnerability Summary for CVE-2008-3275
Original release date:08/12/2008
Last revised:02/26/2009
Source:
US-CERT/NIST
Overview
The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel before 2.6.25.15 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service ("overflow" of the UBIFS orphan area) via a series of attempted file creations within deleted directories.
Impact
CVSS Severity (version 2.0):
Impact Subscore:
6.9
Exploitability Subscore:
3.9
CVSS Version 2 Metrics:
Access Vector: Locally exploitable
Access Complexity: Low
Authentication: Not required to exploit
Impact Type:Allows disruption of serviceUnknown
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.
External Source: BID
Name: 30647
Type: Patch Information
External Source: REDHAT
Name: RHSA-2008:0973
Type: Patch Information
External Source: REDHAT
Name: RHSA-2008:0857
Type: Patch Information
External Source: VUPEN
Name: ADV-2008-2430
Type: Advisory; Patch Information
External Source: DEBIAN
Name: DSA-1636
Type: Patch Information
External Source: DEBIAN
Name: DSA-1630
Type: Patch Information
External Source: CONFIRM
Name: https://bugzilla.redhat.com/show_bug.cgi?id=457858
External Source: XF
Name: linux-kernel-ubifs-dos(44410)
External Source: UBUNTU
Name: USN-637-1
External Source: SECTRACK
Name: 1020739
External Source: REDHAT
Name: RHSA-2009:0014
External Source: REDHAT
Name: RHSA-2008:0885
External Source: REDHAT
Name: RHSA-2008:0787
External Source: MANDRIVA
Name: MDVSA-2008:220
External Source: SECUNIA
Name: 33556
Type: Advisory
External Source: SECUNIA
Name: 33280
Type: Advisory
External Source: SECUNIA
Name: 33201
Type: Advisory
External Source: SECUNIA
Name: 32190
Type: Advisory
External Source: SECUNIA
Name: 32104
External Source: SECUNIA
Name: 32023
Type: Advisory
External Source: SECUNIA
Name: 31881
Type: Advisory
External Source: SECUNIA
Name: 31836
Type: Advisory
External Source: SECUNIA
Name: 31614
Type: Advisory
External Source: SECUNIA
Name: 31551
Type: Advisory
External Source: MLIST
Name: [linux-kernel] 20080702 Is VFS behavior fine?
External Source: SUSE
Name: SUSE-SA:2008:049
External Source: SUSE
Name: SUSE-SA:2008:048
External Source: CONFIRM
Name: http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.15
Type: Advisory
External Source: CONFIRM
Name: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d70b67c8bc72ee23b55381bd6a884f4796692f77