CVE-2009-2908
kernel ecryptfs NULL pointer dereference
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The d_delete function in fs/ecryptfs/inode.c in eCryptfs in the Linux kernel 2.6.31 allows local users to cause a denial of service (kernel OOPS) and possibly execute arbitrary code via unspecified vectors that cause a "negative dentry" and trigger a NULL pointer dereference, as demonstrated via a Mutt temporary directory in an eCryptfs mount.
La función d_delete function en fs/ecryptfs/inode.c en eCryptfs en el kernel de Linux v2.6.31 permite a usuarios locales causar una denegación de servicio (kernel OOPS) y probablemente ejecutar código de su elección a través de vectores no especificados que causa una "entrada negativa" y ejecuta una deferencia a puntero NULL, como fue demostrado a través del directorio temporal Mutt en eCryptifs.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-08-20 CVE Reserved
- 2009-10-13 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.31.y.git%3Ba=commit%3Bh=afc2b6932f48f200736d3e36ad66fee0ec733136 | X_refsource_confirm | |
http://lists.vmware.com/pipermail/security-announce/2010/000082.html | Mailing List | |
http://secunia.com/advisories/37075 | Third Party Advisory | |
http://secunia.com/advisories/37105 | Third Party Advisory | |
http://secunia.com/advisories/38794 | Third Party Advisory | |
http://secunia.com/advisories/38834 | Third Party Advisory | |
http://www.openwall.com/lists/oss-security/2009/10/06/1 | Mailing List | |
http://www.vupen.com/english/advisories/2010/0528 | Vdb Entry | |
https://bugs.launchpad.net/ecryptfs/+bug/387073 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/53693 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10216 | Signature | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6992 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/36639 | 2023-02-13 |
URL | Date | SRC |
---|---|---|
http://www.ubuntu.com/usn/USN-852-1 | 2023-02-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=527534 | 2009-11-03 | |
https://rhn.redhat.com/errata/RHSA-2009-1548.html | 2023-02-13 | |
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html | 2023-02-13 | |
https://access.redhat.com/security/cve/CVE-2009-2908 | 2009-11-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.31 Search vendor "Linux" for product "Linux Kernel" and version "2.6.31" | - |
Affected
|