CVE-2007-3104

The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry.
References
Link Resource
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=242558
http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html
http://osvdb.org/37115
http://rhn.redhat.com/errata/RHSA-2007-0488.html Vendor Advisory
http://secunia.com/advisories/25771 Vendor Advisory
http://secunia.com/advisories/25838 Vendor Advisory
http://secunia.com/advisories/26289 Vendor Advisory
http://secunia.com/advisories/26643 Vendor Advisory
http://secunia.com/advisories/26651 Vendor Advisory
http://secunia.com/advisories/27912 Vendor Advisory
http://secunia.com/advisories/28033 Vendor Advisory
http://secunia.com/advisories/28643 Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm
http://www.debian.org/security/2007/dsa-1428
http://www.redhat.com/support/errata/RHSA-2008-0089.html
http://www.securityfocus.com/bid/24631
http://www.securitytracker.com/id?1018289
http://www.ubuntu.com/usn/usn-508-1
http://www.ubuntu.com/usn/usn-509-1
http://www.ubuntu.com/usn/usn-510-1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11233
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=242558
http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html
http://osvdb.org/37115
http://rhn.redhat.com/errata/RHSA-2007-0488.html Vendor Advisory
http://secunia.com/advisories/25771 Vendor Advisory
http://secunia.com/advisories/25838 Vendor Advisory
http://secunia.com/advisories/26289 Vendor Advisory
http://secunia.com/advisories/26643 Vendor Advisory
http://secunia.com/advisories/26651 Vendor Advisory
http://secunia.com/advisories/27912 Vendor Advisory
http://secunia.com/advisories/28033 Vendor Advisory
http://secunia.com/advisories/28643 Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm
http://www.debian.org/security/2007/dsa-1428
http://www.redhat.com/support/errata/RHSA-2008-0089.html
http://www.securityfocus.com/bid/24631
http://www.securitytracker.com/id?1018289
http://www.ubuntu.com/usn/usn-508-1
http://www.ubuntu.com/usn/usn-509-1
http://www.ubuntu.com/usn/usn-510-1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11233
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:32

Type Values Removed Values Added
References () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=242558 - () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=242558 -
References () http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html -
References () http://osvdb.org/37115 - () http://osvdb.org/37115 -
References () http://rhn.redhat.com/errata/RHSA-2007-0488.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2007-0488.html - Vendor Advisory
References () http://secunia.com/advisories/25771 - Vendor Advisory () http://secunia.com/advisories/25771 - Vendor Advisory
References () http://secunia.com/advisories/25838 - Vendor Advisory () http://secunia.com/advisories/25838 - Vendor Advisory
References () http://secunia.com/advisories/26289 - Vendor Advisory () http://secunia.com/advisories/26289 - Vendor Advisory
References () http://secunia.com/advisories/26643 - Vendor Advisory () http://secunia.com/advisories/26643 - Vendor Advisory
References () http://secunia.com/advisories/26651 - Vendor Advisory () http://secunia.com/advisories/26651 - Vendor Advisory
References () http://secunia.com/advisories/27912 - Vendor Advisory () http://secunia.com/advisories/27912 - Vendor Advisory
References () http://secunia.com/advisories/28033 - Vendor Advisory () http://secunia.com/advisories/28033 - Vendor Advisory
References () http://secunia.com/advisories/28643 - Vendor Advisory () http://secunia.com/advisories/28643 - Vendor Advisory
References () http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm - () http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm -
References () http://www.debian.org/security/2007/dsa-1428 - () http://www.debian.org/security/2007/dsa-1428 -
References () http://www.redhat.com/support/errata/RHSA-2008-0089.html - () http://www.redhat.com/support/errata/RHSA-2008-0089.html -
References () http://www.securityfocus.com/bid/24631 - () http://www.securityfocus.com/bid/24631 -
References () http://www.securitytracker.com/id?1018289 - () http://www.securitytracker.com/id?1018289 -
References () http://www.ubuntu.com/usn/usn-508-1 - () http://www.ubuntu.com/usn/usn-508-1 -
References () http://www.ubuntu.com/usn/usn-509-1 - () http://www.ubuntu.com/usn/usn-509-1 -
References () http://www.ubuntu.com/usn/usn-510-1 - () http://www.ubuntu.com/usn/usn-510-1 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11233 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11233 -

Information

Published : 2007-06-26 18:30

Updated : 2024-11-21 00:32


NVD link : CVE-2007-3104

Mitre link : CVE-2007-3104

CVE.ORG link : CVE-2007-3104


JSON object : View

Products Affected

redhat

  • enterprise_linux

linux

  • linux_kernel
CWE
CWE-399

Resource Management Errors