CVE-2007-6417

The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances related to tmpfs, which might allow local users to read sensitive kernel data or cause a denial of service (crash).
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
http://marc.info/?l=linux-kernel&m=119627664702379&w=2
http://marc.info/?l=linux-kernel&m=119743651829347&w=2
http://marc.info/?l=linux-kernel&m=119769771026243&w=2
http://osvdb.org/44120
http://secunia.com/advisories/28141 Vendor Advisory
http://secunia.com/advisories/28706 Vendor Advisory
http://secunia.com/advisories/28806 Vendor Advisory
http://secunia.com/advisories/28971 Vendor Advisory
http://secunia.com/advisories/32023 Vendor Advisory
http://www.debian.org/security/2007/dsa-1436
http://www.mandriva.com/security/advisories?name=MDVSA-2008:086
http://www.mandriva.com/security/advisories?name=MDVSA-2008:112
http://www.redhat.com/support/errata/RHSA-2008-0885.html
http://www.securityfocus.com/bid/27694
http://www.ubuntu.com/usn/usn-574-1
http://www.ubuntu.com/usn/usn-578-1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8920
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
http://marc.info/?l=linux-kernel&m=119627664702379&w=2
http://marc.info/?l=linux-kernel&m=119743651829347&w=2
http://marc.info/?l=linux-kernel&m=119769771026243&w=2
http://osvdb.org/44120
http://secunia.com/advisories/28141 Vendor Advisory
http://secunia.com/advisories/28706 Vendor Advisory
http://secunia.com/advisories/28806 Vendor Advisory
http://secunia.com/advisories/28971 Vendor Advisory
http://secunia.com/advisories/32023 Vendor Advisory
http://www.debian.org/security/2007/dsa-1436
http://www.mandriva.com/security/advisories?name=MDVSA-2008:086
http://www.mandriva.com/security/advisories?name=MDVSA-2008:112
http://www.redhat.com/support/errata/RHSA-2008-0885.html
http://www.securityfocus.com/bid/27694
http://www.ubuntu.com/usn/usn-574-1
http://www.ubuntu.com/usn/usn-578-1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8920
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*

History

21 Nov 2024, 00:40

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html -
References () http://marc.info/?l=linux-kernel&m=119627664702379&w=2 - () http://marc.info/?l=linux-kernel&m=119627664702379&w=2 -
References () http://marc.info/?l=linux-kernel&m=119743651829347&w=2 - () http://marc.info/?l=linux-kernel&m=119743651829347&w=2 -
References () http://marc.info/?l=linux-kernel&m=119769771026243&w=2 - () http://marc.info/?l=linux-kernel&m=119769771026243&w=2 -
References () http://osvdb.org/44120 - () http://osvdb.org/44120 -
References () http://secunia.com/advisories/28141 - Vendor Advisory () http://secunia.com/advisories/28141 - Vendor Advisory
References () http://secunia.com/advisories/28706 - Vendor Advisory () http://secunia.com/advisories/28706 - Vendor Advisory
References () http://secunia.com/advisories/28806 - Vendor Advisory () http://secunia.com/advisories/28806 - Vendor Advisory
References () http://secunia.com/advisories/28971 - Vendor Advisory () http://secunia.com/advisories/28971 - Vendor Advisory
References () http://secunia.com/advisories/32023 - Vendor Advisory () http://secunia.com/advisories/32023 - Vendor Advisory
References () http://www.debian.org/security/2007/dsa-1436 - () http://www.debian.org/security/2007/dsa-1436 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:086 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:086 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:112 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:112 -
References () http://www.redhat.com/support/errata/RHSA-2008-0885.html - () http://www.redhat.com/support/errata/RHSA-2008-0885.html -
References () http://www.securityfocus.com/bid/27694 - () http://www.securityfocus.com/bid/27694 -
References () http://www.ubuntu.com/usn/usn-574-1 - () http://www.ubuntu.com/usn/usn-574-1 -
References () http://www.ubuntu.com/usn/usn-578-1 - () http://www.ubuntu.com/usn/usn-578-1 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8920 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8920 -

Information

Published : 2007-12-18 00:46

Updated : 2024-11-21 00:40


NVD link : CVE-2007-6417

Mitre link : CVE-2007-6417

CVE.ORG link : CVE-2007-6417


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-399

Resource Management Errors