CVE-2007-1592

net/ipv6/tcp_ipv6.c in Linux kernel 2.6.x up to 2.6.21-rc3 inadvertently copies the ipv6_fl_socklist from a listening TCP socket to child sockets, which allows local users to cause a denial of service (OOPS) or double free by opening a listening IPv6 socket, attaching a flow label, and connecting to that socket.
References
Link Resource
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233478
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d35690beda1429544d46c8eb34b2e3a8c37ab299
http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html
http://marc.info/?l=linux-netdev&m=117406721731891&w=2
http://rhn.redhat.com/errata/RHBA-2007-0304.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2007-0436.html Vendor Advisory
http://secunia.com/advisories/24618 Vendor Advisory
http://secunia.com/advisories/24777 Vendor Advisory
http://secunia.com/advisories/25078 Vendor Advisory
http://secunia.com/advisories/25099 Vendor Advisory
http://secunia.com/advisories/25226 Vendor Advisory
http://secunia.com/advisories/25288 Vendor Advisory
http://secunia.com/advisories/25392 Vendor Advisory
http://secunia.com/advisories/25630 Vendor Advisory
http://secunia.com/advisories/25683 Vendor Advisory
http://secunia.com/advisories/25714 Vendor Advisory
http://secunia.com/advisories/25961 Vendor Advisory
http://secunia.com/advisories/26379 Vendor Advisory
http://secunia.com/advisories/27528 Vendor Advisory
http://secunia.com/advisories/29058 Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm
http://www.debian.org/security/2007/dsa-1286
http://www.debian.org/security/2007/dsa-1304
http://www.debian.org/security/2008/dsa-1503
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.4
http://www.mandriva.com/security/advisories?name=MDKSA-2007:078
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
http://www.novell.com/linux/security/advisories/2007_30_kernel.html
http://www.novell.com/linux/security/advisories/2007_35_kernel.html
http://www.novell.com/linux/security/advisories/2007_43_kernel.html
http://www.redhat.com/support/errata/RHSA-2007-0347.html
http://www.redhat.com/support/errata/RHSA-2007-0672.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2007-0673.html Vendor Advisory
http://www.securityfocus.com/bid/23104 Patch
http://www.ubuntu.com/usn/usn-464-1
http://www.vupen.com/english/advisories/2007/1084 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/33176
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10130
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233478
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d35690beda1429544d46c8eb34b2e3a8c37ab299
http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html
http://marc.info/?l=linux-netdev&m=117406721731891&w=2
http://rhn.redhat.com/errata/RHBA-2007-0304.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2007-0436.html Vendor Advisory
http://secunia.com/advisories/24618 Vendor Advisory
http://secunia.com/advisories/24777 Vendor Advisory
http://secunia.com/advisories/25078 Vendor Advisory
http://secunia.com/advisories/25099 Vendor Advisory
http://secunia.com/advisories/25226 Vendor Advisory
http://secunia.com/advisories/25288 Vendor Advisory
http://secunia.com/advisories/25392 Vendor Advisory
http://secunia.com/advisories/25630 Vendor Advisory
http://secunia.com/advisories/25683 Vendor Advisory
http://secunia.com/advisories/25714 Vendor Advisory
http://secunia.com/advisories/25961 Vendor Advisory
http://secunia.com/advisories/26379 Vendor Advisory
http://secunia.com/advisories/27528 Vendor Advisory
http://secunia.com/advisories/29058 Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm
http://www.debian.org/security/2007/dsa-1286
http://www.debian.org/security/2007/dsa-1304
http://www.debian.org/security/2008/dsa-1503
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.4
http://www.mandriva.com/security/advisories?name=MDKSA-2007:078
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
http://www.novell.com/linux/security/advisories/2007_30_kernel.html
http://www.novell.com/linux/security/advisories/2007_35_kernel.html
http://www.novell.com/linux/security/advisories/2007_43_kernel.html
http://www.redhat.com/support/errata/RHSA-2007-0347.html
http://www.redhat.com/support/errata/RHSA-2007-0672.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2007-0673.html Vendor Advisory
http://www.securityfocus.com/bid/23104 Patch
http://www.ubuntu.com/usn/usn-464-1
http://www.vupen.com/english/advisories/2007/1084 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/33176
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10130
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*

History

21 Nov 2024, 00:28

Type Values Removed Values Added
References () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233478 - () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233478 -
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d35690beda1429544d46c8eb34b2e3a8c37ab299 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d35690beda1429544d46c8eb34b2e3a8c37ab299 -
References () http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html - () http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html -
References () http://marc.info/?l=linux-netdev&m=117406721731891&w=2 - () http://marc.info/?l=linux-netdev&m=117406721731891&w=2 -
References () http://rhn.redhat.com/errata/RHBA-2007-0304.html - Vendor Advisory () http://rhn.redhat.com/errata/RHBA-2007-0304.html - Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2007-0436.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2007-0436.html - Vendor Advisory
References () http://secunia.com/advisories/24618 - Vendor Advisory () http://secunia.com/advisories/24618 - Vendor Advisory
References () http://secunia.com/advisories/24777 - Vendor Advisory () http://secunia.com/advisories/24777 - Vendor Advisory
References () http://secunia.com/advisories/25078 - Vendor Advisory () http://secunia.com/advisories/25078 - Vendor Advisory
References () http://secunia.com/advisories/25099 - Vendor Advisory () http://secunia.com/advisories/25099 - Vendor Advisory
References () http://secunia.com/advisories/25226 - Vendor Advisory () http://secunia.com/advisories/25226 - Vendor Advisory
References () http://secunia.com/advisories/25288 - Vendor Advisory () http://secunia.com/advisories/25288 - Vendor Advisory
References () http://secunia.com/advisories/25392 - Vendor Advisory () http://secunia.com/advisories/25392 - Vendor Advisory
References () http://secunia.com/advisories/25630 - Vendor Advisory () http://secunia.com/advisories/25630 - Vendor Advisory
References () http://secunia.com/advisories/25683 - Vendor Advisory () http://secunia.com/advisories/25683 - Vendor Advisory
References () http://secunia.com/advisories/25714 - Vendor Advisory () http://secunia.com/advisories/25714 - Vendor Advisory
References () http://secunia.com/advisories/25961 - Vendor Advisory () http://secunia.com/advisories/25961 - Vendor Advisory
References () http://secunia.com/advisories/26379 - Vendor Advisory () http://secunia.com/advisories/26379 - Vendor Advisory
References () http://secunia.com/advisories/27528 - Vendor Advisory () http://secunia.com/advisories/27528 - Vendor Advisory
References () http://secunia.com/advisories/29058 - Vendor Advisory () http://secunia.com/advisories/29058 - Vendor Advisory
References () http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm - () http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm -
References () http://www.debian.org/security/2007/dsa-1286 - () http://www.debian.org/security/2007/dsa-1286 -
References () http://www.debian.org/security/2007/dsa-1304 - () http://www.debian.org/security/2007/dsa-1304 -
References () http://www.debian.org/security/2008/dsa-1503 - () http://www.debian.org/security/2008/dsa-1503 -
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.4 - () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.4 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:078 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:078 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 -
References () http://www.novell.com/linux/security/advisories/2007_30_kernel.html - () http://www.novell.com/linux/security/advisories/2007_30_kernel.html -
References () http://www.novell.com/linux/security/advisories/2007_35_kernel.html - () http://www.novell.com/linux/security/advisories/2007_35_kernel.html -
References () http://www.novell.com/linux/security/advisories/2007_43_kernel.html - () http://www.novell.com/linux/security/advisories/2007_43_kernel.html -
References () http://www.redhat.com/support/errata/RHSA-2007-0347.html - () http://www.redhat.com/support/errata/RHSA-2007-0347.html -
References () http://www.redhat.com/support/errata/RHSA-2007-0672.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2007-0672.html - Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2007-0673.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2007-0673.html - Vendor Advisory
References () http://www.securityfocus.com/bid/23104 - Patch () http://www.securityfocus.com/bid/23104 - Patch
References () http://www.ubuntu.com/usn/usn-464-1 - () http://www.ubuntu.com/usn/usn-464-1 -
References () http://www.vupen.com/english/advisories/2007/1084 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/1084 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/33176 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/33176 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10130 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10130 -

07 Nov 2023, 02:00

Type Values Removed Values Added
References
  • {'url': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d35690beda1429544d46c8eb34b2e3a8c37ab299', 'name': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d35690beda1429544d46c8eb34b2e3a8c37ab299', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d35690beda1429544d46c8eb34b2e3a8c37ab299 -

Information

Published : 2007-03-22 19:19

Updated : 2024-11-21 00:28


NVD link : CVE-2007-1592

Mitre link : CVE-2007-1592

CVE.ORG link : CVE-2007-1592


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer