CVE-2007-1865

The ipv6_getsockopt_sticky function in the kernel in Red Hat Enterprise Linux (RHEL) Beta 5.1.0 allows local users to obtain sensitive information (kernel memory contents) via a negative value of the len parameter. NOTE: this issue has been disputed in a bug comment, stating that "len is ignored when copying header info to the user's buffer.
Configurations

Configuration 1 (hide)

cpe:2.3:o:redhat:enterprise_linux:5.1.0:beta:*:*:*:*:*:*

History

21 Nov 2024, 00:29

Type Values Removed Values Added
References () http://osvdb.org/45909 - () http://osvdb.org/45909 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=232045 - () https://bugzilla.redhat.com/show_bug.cgi?id=232045 -

07 Nov 2023, 02:00

Type Values Removed Values Added
Summary ** DISPUTED ** The ipv6_getsockopt_sticky function in the kernel in Red Hat Enterprise Linux (RHEL) Beta 5.1.0 allows local users to obtain sensitive information (kernel memory contents) via a negative value of the len parameter. NOTE: this issue has been disputed in a bug comment, stating that "len is ignored when copying header info to the user's buffer." The ipv6_getsockopt_sticky function in the kernel in Red Hat Enterprise Linux (RHEL) Beta 5.1.0 allows local users to obtain sensitive information (kernel memory contents) via a negative value of the len parameter. NOTE: this issue has been disputed in a bug comment, stating that "len is ignored when copying header info to the user's buffer.

Information

Published : 2007-09-18 19:17

Updated : 2024-11-21 00:29


NVD link : CVE-2007-1865

Mitre link : CVE-2007-1865

CVE.ORG link : CVE-2007-1865


JSON object : View

Products Affected

redhat

  • enterprise_linux
CWE
CWE-189

Numeric Errors