2.1
CVSSv2

CVE-2007-6206

Published: 04/12/2007 Updated: 07/11/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 188
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.24

linux linux kernel

opensuse opensuse 10.2

opensuse opensuse 10.3

suse linux enterprise software development kit 10

suse linux enterprise server 10

suse linux enterprise real time extension 10

suse linux enterprise desktop 10

redhat enterprise linux desktop 4.0

redhat enterprise linux server 4.0

redhat enterprise linux workstation 4.0

redhat enterprise linux eus 4.6

debian debian linux 3.1

debian debian linux 4.0

canonical ubuntu linux 7.04

canonical ubuntu linux 7.10

canonical ubuntu linux 6.10

canonical ubuntu linux 6.06

Vendor Advisories

Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix a number of security issues are nowavailable for Red Hat Enterprise Linux 21 running on 64-bit architecturesThis update has been rated as having important security impact by the Red ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix a number of security issues are nowavailable for Red Hat Enterprise Linux 21 running on 32-bit architecturesThis update has been rated as having important security impact by the Red ...
The minix filesystem did not properly validate certain filesystem values If a local attacker could trick the system into attempting to mount a corrupted minix filesystem, the kernel could be made to hang for long periods of time, resulting in a denial of service This was only vulnerable in Ubuntu 704 and 710 (CVE-2006-6058) ...
The minix filesystem did not properly validate certain filesystem values If a local attacker could trick the system into attempting to mount a corrupted minix filesystem, the kernel could be made to hang for long periods of time, resulting in a denial of service (CVE-2006-6058) ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2004-2731 infamous41md reported multiple integer overflows in the Sbus PROM driver that would allo ...
Several local vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2006-6058 LMH reported an issue in the minix filesystem that allows local users with mount privileges to crea ...

References

CWE-200http://bugzilla.kernel.org/show_bug.cgi?id=3043http://www.securityfocus.com/bid/26701http://secunia.com/advisories/27908http://www.debian.org/security/2007/dsa-1436http://secunia.com/advisories/28141http://www.redhat.com/support/errata/RHSA-2008-0089.htmlhttp://rhn.redhat.com/errata/RHSA-2008-0055.htmlhttp://www.ubuntu.com/usn/usn-574-1http://secunia.com/advisories/28748http://secunia.com/advisories/28706http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048http://www.mandriva.com/security/advisories?name=MDVSA-2008:044http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.htmlhttp://secunia.com/advisories/28826http://secunia.com/advisories/28889http://www.debian.org/security/2008/dsa-1503http://www.debian.org/security/2008/dsa-1504http://www.ubuntu.com/usn/usn-578-1http://secunia.com/advisories/28971http://secunia.com/advisories/29058http://secunia.com/advisories/28643http://www.mandriva.com/security/advisories?name=MDVSA-2008:086http://www.redhat.com/support/errata/RHSA-2008-0211.htmlhttp://lists.vmware.com/pipermail/security-announce/2008/000023.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:112http://secunia.com/advisories/31246http://secunia.com/advisories/30962http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.htmlhttp://secunia.com/advisories/30818http://secunia.com/advisories/30110http://secunia.com/advisories/33280http://www.redhat.com/support/errata/RHSA-2008-0787.htmlhttp://www.vupen.com/english/advisories/2007/4090http://www.vupen.com/english/advisories/2008/2222/referenceshttps://exchange.xforce.ibmcloud.com/vulnerabilities/38841https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10719http://www.securityfocus.com/archive/1/487808/100/0/threadedhttp://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=c46f739dd39db3b07ab5deb4e3ec81e1c04a91afhttps://access.redhat.com/errata/RHSA-2008:0787https://nvd.nist.govhttps://usn.ubuntu.com/574-1/