First published: Fri May 02 2008(Updated: )
Race condition in the directory notification subsystem (dnotify) in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 before 2.6.25.1, allows local users to cause a denial of service (OOPS) and possibly gain privileges via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=2.6.0<2.6.24.6 | |
Linux kernel | =2.6.25 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.04 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
openSUSE libeconf | =10.2 | |
openSUSE libeconf | =10.3 | |
SUSE Linux Enterprise Desktop | =10-sp1 | |
SUSE Linux Enterprise Server | =9 | |
SUSE Linux Enterprise Server | =10-sp1 | |
SUSE Linux Enterprise Software Development Kit | =10-sp1 | |
Debian | =4.0 | |
Fedora | =8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1375 has a high severity level due to its potential to cause denial of service and possibly privilege escalation.
To fix CVE-2008-1375, update your Linux kernel to version 2.6.24.6 or later, or 2.6.25.1 or later.
CVE-2008-1375 affects Linux kernel versions 2.6.0 to 2.6.24.6 and 2.6.25 up to 2.6.25.1 across various distributions.
CVE-2008-1375 can be exploited through unspecified vectors that may lead to a denial of service (OOPS).
While you can still use your system, it is recommended to update immediately to avoid potential denial of service and privilege escalation risks.