4.9
CVSSv2

CVE-2007-5500

Published: 20/11/2007 Updated: 07/11/2023
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
VMScore: 436
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The wait_task_stopped function in the Linux kernel prior to 2.6.23.8 checks a TASK_TRACED bit instead of an exit_state value, which allows local users to cause a denial of service (machine crash) via unspecified vectors. NOTE: some of these details are obtained from third party information.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: This is an update to DSA 1428-1 which omitted a reference to CVE-2007-5904 CVE-2007-3104 Eric Sandeen pro ...
The minix filesystem did not properly validate certain filesystem values If a local attacker could trick the system into attempting to mount a corrupted minix filesystem, the kernel could be made to hang for long periods of time, resulting in a denial of service This was only vulnerable in Ubuntu 704 and 710 (CVE-2006-6058) ...
The minix filesystem did not properly validate certain filesystem values If a local attacker could trick the system into attempting to mount a corrupted minix filesystem, the kernel could be made to hang for long periods of time, resulting in a denial of service (CVE-2006-6058) ...
The minix filesystem did not properly validate certain filesystem values If a local attacker could trick the system into attempting to mount a corrupted minix filesystem, the kernel could be made to hang for long periods of time, resulting in a denial of service (CVE-2006-6058) ...

References

NVD-CWE-Otherhttp://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.8http://www.securityfocus.com/bid/26477https://issues.rpath.com/browse/RPL-1965http://www.novell.com/linux/security/advisories/2007_63_kernel.htmlhttp://secunia.com/advisories/27664http://secunia.com/advisories/27703http://secunia.com/advisories/27888http://www.debian.org/security/2007/dsa-1428https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00170.htmlhttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00032.htmlhttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00302.htmlhttp://secunia.com/advisories/28033http://secunia.com/advisories/27919http://secunia.com/advisories/27922http://www.mandriva.com/security/advisories?name=MDVSA-2008:008http://rhn.redhat.com/errata/RHSA-2008-0055.htmlhttp://www.ubuntu.com/usn/usn-574-1http://secunia.com/advisories/28748http://secunia.com/advisories/28706http://www.mandriva.com/security/advisories?name=MDVSA-2008:044http://www.ubuntu.com/usn/usn-558-1http://secunia.com/advisories/28170http://www.ubuntu.com/usn/usn-578-1http://secunia.com/advisories/28971http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.htmlhttp://secunia.com/advisories/29245http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:112http://secunia.com/advisories/30818http://secunia.com/advisories/30962http://www.vupen.com/english/advisories/2007/3902https://exchange.xforce.ibmcloud.com/vulnerabilities/38547https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9868http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.23.y.git%3Ba=commitdiff%3Bh=36ef66c5d137b9a31fd8c35d236fb9e26ef74f97https://nvd.nist.govhttps://www.debian.org/security/./dsa-1428https://usn.ubuntu.com/574-1/