CVE-2007-6716

fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23 does not properly zero out the dio struct, which allows local users to cause a denial of service (OOPS), as demonstrated by a certain fio test.
References
Link Resource
http://lkml.org/lkml/2007/7/30/448 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2008/09/04/1 Mailing List Patch Third Party Advisory
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=848c4dd5153c7a0de55470ce99a8e13a63b4703f Mailing List Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=461082 Issue Tracking Patch Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23 Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0885.html Broken Link
http://secunia.com/advisories/32023 Broken Link
http://www.ubuntu.com/usn/usn-659-1 Third Party Advisory
http://secunia.com/advisories/32393 Broken Link
http://secunia.com/advisories/32799 Broken Link
http://rhn.redhat.com/errata/RHSA-2008-0972.html Third Party Advisory
http://secunia.com/advisories/32759 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html Mailing List Third Party Advisory
http://secunia.com/advisories/32103 Broken Link
http://secunia.com/advisories/32237 Broken Link
http://www.securityfocus.com/bid/31515 Third Party Advisory VDB Entry
http://www.debian.org/security/2008/dsa-1653 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:220 Broken Link
http://secunia.com/advisories/32356 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html Mailing List Third Party Advisory
http://secunia.com/advisories/32370 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10053 Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp2:*:*:*:*:*:*

Information

Published : 2008-09-04 10:41

Updated : 2020-08-14 08:40


NVD link : CVE-2007-6716

Mitre link : CVE-2007-6716


JSON object : View

Advertisement

dedicated server usa

Products Affected

novell

  • linux_desktop

suse

  • suse_linux_enterprise_desktop
  • suse_linux_enterprise_server

canonical

  • ubuntu_linux

linux

  • linux_kernel

debian

  • debian_linux

opensuse

  • opensuse