First published: Tue Jul 08 2008(Updated: )
The do_change_type function in fs/namespace.c in the Linux kernel before 2.6.22 does not verify that the caller has the CAP_SYS_ADMIN capability, which allows local users to gain privileges or cause a denial of service by modifying the properties of a mountpoint.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <2.6.22 | |
Debian GNU/Linux | =4.0 | |
SUSE Linux Enterprise Desktop | =10.0-sp1 | |
SUSE Linux Enterprise Desktop | =10.0-sp2 | |
SUSE Linux Enterprise Server | =10.0-sp1 | |
SUSE Linux Enterprise Server | =10.0-sp2 | |
openSUSE | >=10.3<=11.0 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.04 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
Linux kernel | <2.6.22 | |
Debian | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2931 is considered a medium severity vulnerability due to its potential to allow privilege escalation.
To mitigate CVE-2008-2931, upgrade to a version of the Linux kernel that is 2.6.22 or later.
Users running Linux kernel versions prior to 2.6.22, including certain distributions like Debian 4.0 and SUSE Linux Enterprise, are affected by CVE-2008-2931.
CVE-2008-2931 can facilitate local privilege escalation attacks, allowing unprivileged users to gain elevated privileges.
The vulnerability in CVE-2008-2931 is due to the do_change_type function in the fs/namespace.c file of the Linux kernel.