CVE-2007-6716

MEDIUM

Description

fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23 does not properly zero out the dio struct, which allows local users to cause a denial of service (OOPS), as demonstrated by a certain fio test.

References

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=848c4dd5153c7a0de55470ce99a8e13a63b4703f

http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html

http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html

http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html

http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html

http://lkml.org/lkml/2007/7/30/448

http://rhn.redhat.com/errata/RHSA-2008-0972.html

http://secunia.com/advisories/32023

http://secunia.com/advisories/32103

http://secunia.com/advisories/32237

http://secunia.com/advisories/32356

http://secunia.com/advisories/32370

http://secunia.com/advisories/32393

http://secunia.com/advisories/32759

http://secunia.com/advisories/32799

http://www.debian.org/security/2008/dsa-1653

http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23

http://www.mandriva.com/security/advisories?name=MDVSA-2008:220

http://www.openwall.com/lists/oss-security/2008/09/04/1

http://www.redhat.com/support/errata/RHSA-2008-0885.html

http://www.securityfocus.com/bid/31515

http://www.ubuntu.com/usn/usn-659-1

https://bugzilla.redhat.com/show_bug.cgi?id=461082

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10053

Details

Source: MITRE

Published: 2008-09-04

Updated: 2020-08-14

Risk Information

CVSS v2.0

Base Score: 4.9

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.9

Severity: MEDIUM

CVSS v3.0

Base Score: 5.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 1.8

Severity: MEDIUM

Tenable Plugins

View all (19 total)

IDNameProductFamilySeverity
79448OracleVM 2.1 : kernel (OVMSA-2008-2006)NessusOracleVM Local Security Checks
high
67762Oracle Linux 4 : kernel (ELSA-2008-0972)NessusOracle Linux Local Security Checks
medium
67747Oracle Linux 5 : kernel (ELSA-2008-0885)NessusOracle Linux Local Security Checks
high
60497Scientific Linux Security Update : kernel on SL4.x i386/x86_64NessusScientific Linux Local Security Checks
medium
60477Scientific Linux Security Update : kernel on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
high
59134SuSE 10 Security Update : Linux Kernel (x86_64) (ZYPP Patch Number 5735)NessusSuSE Local Security Checks
medium
59132SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5667)NessusSuSE Local Security Checks
high
43710CentOS 5 : kernel (CESA-2008:0885)NessusCentOS Local Security Checks
high
41535SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5668)NessusSuSE Local Security Checks
high
37341CentOS 4 : kernel (CESA-2008:0972)NessusCentOS Local Security Checks
medium
36681Ubuntu 6.06 LTS / 7.10 / 8.04 LTS : linux, linux-source-2.6.15/22 vulnerabilities (USN-659-1)NessusUbuntu Local Security Checks
high
35026SuSE 10 Security Update : Linux Kernel (x86) (ZYPP Patch Number 5734)NessusSuSE Local Security Checks
medium
34841RHEL 4 : kernel (RHSA-2008:0972)NessusRed Hat Local Security Checks
medium
34755openSUSE 10 Security Update : kernel (kernel-5751)NessusSuSE Local Security Checks
critical
34457openSUSE 10 Security Update : kernel (kernel-5700)NessusSuSE Local Security Checks
critical
34392Debian DSA-1653-1 : linux-2.6 - denial of service/privilege escalationNessusDebian Local Security Checks
high
34288RHEL 5 : kernel (RHSA-2008:0885)NessusRed Hat Local Security Checks
high
801459CentOS RHSA-2008-0972 Security CheckLog Correlation EngineGeneric
high
801457CentOS RHSA-2008-0885 Security CheckLog Correlation EngineGeneric
high