First published: Fri Aug 08 2008(Updated: )
The shmem_delete_inode function in mm/shmem.c in the tmpfs implementation in the Linux kernel before 2.6.26.1 allows local users to cause a denial of service (system crash) via a certain sequence of file create, remove, and overwrite operations, as demonstrated by the insserv program, related to allocation of "useless pages" and improper maintenance of the i_blocks count.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <2.6.26.1 | |
Debian GNU/Linux | =4.0 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
Debian | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3534 has a moderate severity level as it can lead to a denial of service through crashes caused by specific file operations.
To fix CVE-2008-3534, users should update their Linux kernel to version 2.6.26.1 or later.
CVE-2008-3534 affects local users of the Linux kernel versions prior to 2.6.26.1 on systems using tmpfs.
CVE-2008-3534 impacts various Linux distributions such as Debian 4.0 and Ubuntu versions 6.06, 7.10, and 8.04.
CVE-2008-3534 is categorized as a denial of service vulnerability due to file operation sequences causing system crashes.