Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-cf2v-zn7q-b3gd
Vulnerability ID VCID-cf2v-zn7q-b3gd
Aliases CVE-2008-3275
Summary Linux kernel local filesystem DoS
Status Published
Exploitability 0.5
Weighted Severity 5.0
Risk 2.5
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d70b67c8bc72ee23b55381bd6a884f4796692f77
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.15
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
http://lkml.org/lkml/2008/7/2/83
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3275.json
https://api.first.org/data/v1/epss?cve=CVE-2008-3275
http://secunia.com/advisories/31551
http://secunia.com/advisories/31614
http://secunia.com/advisories/31836
http://secunia.com/advisories/31881
http://secunia.com/advisories/32023
http://secunia.com/advisories/32104
http://secunia.com/advisories/32190
http://secunia.com/advisories/32344
http://secunia.com/advisories/33201
http://secunia.com/advisories/33280
http://secunia.com/advisories/33556
https://exchange.xforce.ibmcloud.com/vulnerabilities/44410
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10744
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6551
http://www.debian.org/security/2008/dsa-1630
http://www.debian.org/security/2008/dsa-1636
http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
http://www.redhat.com/support/errata/RHSA-2008-0787.html
http://www.redhat.com/support/errata/RHSA-2008-0857.html
http://www.redhat.com/support/errata/RHSA-2008-0885.html
http://www.redhat.com/support/errata/RHSA-2008-0973.html
http://www.redhat.com/support/errata/RHSA-2009-0014.html
http://www.securityfocus.com/bid/30647
http://www.securitytracker.com/id?1020739
http://www.vupen.com/english/advisories/2008/2430
457858 https://bugzilla.redhat.com/show_bug.cgi?id=457858
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*
CVE-2008-3275 https://nvd.nist.gov/vuln/detail/CVE-2008-3275
RHSA-2008:0787 https://access.redhat.com/errata/RHSA-2008:0787
RHSA-2008:0857 https://access.redhat.com/errata/RHSA-2008:0857
RHSA-2008:0885 https://access.redhat.com/errata/RHSA-2008:0885
RHSA-2008:0973 https://access.redhat.com/errata/RHSA-2008:0973
RHSA-2009:0001 https://access.redhat.com/errata/RHSA-2009:0001
RHSA-2009:0014 https://access.redhat.com/errata/RHSA-2009:0014
USN-637-1 https://usn.ubuntu.com/637-1/
No exploits are available.
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2008-3275
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2008-3275
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.22927
EPSS Score 0.00077
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T14:59:02.560048+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3275.json 38.0.0