7.2
CVSSv2

CVE-2008-0007

Published: 08/02/2008 Updated: 15/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Linux kernel prior to 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

It was discovered that the ALSA /proc interface did not write the correct number of bytes when reporting memory allocations A local attacker might be able to access sensitive kernel memory, leading to a loss of privacy (CVE-2007-4571) ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix a number of security issues are nowavailable for Red Hat Enterprise Linux 21 running on 64-bit architecturesThis update has been rated as having important security impact by the Red ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix a number of security issues are nowavailable for Red Hat Enterprise Linux 21 running on 32-bit architecturesThis update has been rated as having important security impact by the Red ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2004-2731 infamous41md reported multiple integer overflows in the Sbus PROM driver that would allo ...

References

CWE-399http://lkml.org/lkml/2008/2/6/457http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.17http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.htmlhttp://secunia.com/advisories/28806http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048http://www.mandriva.com/security/advisories?name=MDVSA-2008:044http://www.securityfocus.com/bid/27686http://www.securityfocus.com/bid/27705http://securitytracker.com/id?1019357http://secunia.com/advisories/28826http://www.debian.org/security/2008/dsa-1503http://www.debian.org/security/2008/dsa-1504http://secunia.com/advisories/29058http://www.mandriva.com/security/advisories?name=MDVSA-2008:072http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.htmlhttp://secunia.com/advisories/29570http://www.redhat.com/support/errata/RHSA-2008-0211.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0233.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0237.htmlhttp://secunia.com/advisories/31246http://www.ubuntu.com/usn/usn-618-1http://www.mandriva.com/security/advisories?name=MDVSA-2008:112http://secunia.com/advisories/30769http://lists.vmware.com/pipermail/security-announce/2008/000023.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:174http://secunia.com/advisories/30112http://secunia.com/advisories/30018http://www.debian.org/security/2008/dsa-1565http://secunia.com/advisories/30116http://secunia.com/advisories/30110http://www.redhat.com/support/errata/RHSA-2008-0787.htmlhttp://secunia.com/advisories/33280http://www.vupen.com/english/advisories/2008/2222/referenceshttp://www.vupen.com/english/advisories/2008/0445/referenceshttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9412http://www.securityfocus.com/archive/1/487808/100/0/threadedhttps://usn.ubuntu.com/618-1/https://nvd.nist.gov