2024-12-08 03:06:42 +00:00

225 lines
7.4 KiB
JSON

{
"id": "CVE-2009-2908",
"sourceIdentifier": "secalert@redhat.com",
"published": "2009-10-13T10:30:00.547",
"lastModified": "2024-11-21T01:06:01.950",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The d_delete function in fs/ecryptfs/inode.c in eCryptfs in the Linux kernel 2.6.31 allows local users to cause a denial of service (kernel OOPS) and possibly execute arbitrary code via unspecified vectors that cause a \"negative dentry\" and trigger a NULL pointer dereference, as demonstrated via a Mutt temporary directory in an eCryptfs mount."
},
{
"lang": "es",
"value": "La funci\u00f3n d_delete function en fs/ecryptfs/inode.c en eCryptfs en el kernel de Linux v2.6.31 permite a usuarios locales causar una denegaci\u00f3n de servicio (kernel OOPS) y probablemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados que causa una \"entrada negativa\" y ejecuta una deferencia a puntero NULL, como fue demostrado a trav\u00e9s del directorio temporal Mutt en eCryptifs."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"baseScore": 4.9,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*",
"matchCriteriaId": "C4033E0B-A3A1-4CC5-956A-AAA0FB905DDA"
}
]
}
]
}
],
"references": [
{
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.31.y.git%3Ba=commit%3Bh=afc2b6932f48f200736d3e36ad66fee0ec733136",
"source": "secalert@redhat.com"
},
{
"url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html",
"source": "secalert@redhat.com"
},
{
"url": "http://secunia.com/advisories/37075",
"source": "secalert@redhat.com"
},
{
"url": "http://secunia.com/advisories/37105",
"source": "secalert@redhat.com"
},
{
"url": "http://secunia.com/advisories/38794",
"source": "secalert@redhat.com"
},
{
"url": "http://secunia.com/advisories/38834",
"source": "secalert@redhat.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/10/06/1",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/bid/36639",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.ubuntu.com/usn/USN-852-1",
"source": "secalert@redhat.com"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0528",
"source": "secalert@redhat.com"
},
{
"url": "https://bugs.launchpad.net/ecryptfs/+bug/387073",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=527534",
"source": "secalert@redhat.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53693",
"source": "secalert@redhat.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10216",
"source": "secalert@redhat.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6992",
"source": "secalert@redhat.com"
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2009-1548.html",
"source": "secalert@redhat.com"
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html",
"source": "secalert@redhat.com"
},
{
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.31.y.git%3Ba=commit%3Bh=afc2b6932f48f200736d3e36ad66fee0ec733136",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/37075",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/37105",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/38794",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/38834",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/10/06/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/36639",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.ubuntu.com/usn/USN-852-1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2010/0528",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://bugs.launchpad.net/ecryptfs/+bug/387073",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=527534",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53693",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10216",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6992",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://rhn.redhat.com/errata/RHSA-2009-1548.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG do not include support for eCryptfs, and therefore are not affected by this issue.\n\nIt was addressed in Red Hat Enterprise Linux 5 via: https://rhn.redhat.com/errata/RHSA-2009-1548.html",
"lastModified": "2009-11-04T00:00:00"
}
]
}