ID |
CVE-2007-3104
|
Summary |
The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 4.9 (as of 11-10-2017 - 01:32) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-399 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
COMPLETE |
|
cvss-vector
via4
|
AV:L/AC:L/Au:N/C:N/I:N/A:C
|
oval
via4
|
accepted | 2013-04-29T04:12:33.737-04:00 | class | vulnerability | contributors | name | Aharon Chernin | organization | SCAP.com, LLC |
name | Dragos Prisaca | organization | G2, Inc. |
| definition_extensions | comment | The operating system installed on the system is Red Hat Enterprise Linux 4 | oval | oval:org.mitre.oval:def:11831 |
comment | CentOS Linux 4.x | oval | oval:org.mitre.oval:def:16636 |
comment | Oracle Linux 4.x | oval | oval:org.mitre.oval:def:15990 |
comment | The operating system installed on the system is Red Hat Enterprise Linux 5 | oval | oval:org.mitre.oval:def:11414 |
comment | The operating system installed on the system is CentOS Linux 5.x | oval | oval:org.mitre.oval:def:15802 |
comment | Oracle Linux 5.x | oval | oval:org.mitre.oval:def:15459 |
| description | The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry. | family | unix | id | oval:org.mitre.oval:def:11233 | status | accepted | submitted | 2010-07-09T03:56:16-04:00 | title | The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry. | version | 30 |
|
redhat
via4
|
advisories | bugzilla | id | 427994 | title | CVE-2007-3104 Null pointer to an inode in a dentry can cause an oops in sysfs_readdir |
| oval | OR | comment | Red Hat Enterprise Linux must be installed | oval | oval:com.redhat.rhba:tst:20070304026 |
AND | comment | Red Hat Enterprise Linux 4 is installed | oval | oval:com.redhat.rhba:tst:20070304025 |
OR | comment | kernel earlier than 0:2.6.9-55.0.2.EL is currently running | oval | oval:com.redhat.rhsa:tst:20070488023 |
comment | kernel earlier than 0:2.6.9-55.0.2.EL is set to boot up on next boot | oval | oval:com.redhat.rhsa:tst:20070488024 |
|
OR | AND | comment | kernel is earlier than 0:2.6.9-55.0.2.EL | oval | oval:com.redhat.rhsa:tst:20070488001 |
comment | kernel is signed with Red Hat master key | oval | oval:com.redhat.rhba:tst:20070304002 |
|
AND | comment | kernel-devel is earlier than 0:2.6.9-55.0.2.EL | oval | oval:com.redhat.rhsa:tst:20070488003 |
comment | kernel-devel is signed with Red Hat master key | oval | oval:com.redhat.rhba:tst:20070304004 |
|
AND | comment | kernel-doc is earlier than 0:2.6.9-55.0.2.EL | oval | oval:com.redhat.rhsa:tst:20070488005 |
comment | kernel-doc is signed with Red Hat master key | oval | oval:com.redhat.rhba:tst:20070304006 |
|
AND | comment | kernel-hugemem is earlier than 0:2.6.9-55.0.2.EL | oval | oval:com.redhat.rhsa:tst:20070488007 |
comment | kernel-hugemem is signed with Red Hat master key | oval | oval:com.redhat.rhba:tst:20070304008 |
|
AND | comment | kernel-hugemem-devel is earlier than 0:2.6.9-55.0.2.EL | oval | oval:com.redhat.rhsa:tst:20070488009 |
comment | kernel-hugemem-devel is signed with Red Hat master key | oval | oval:com.redhat.rhba:tst:20070304010 |
|
AND | comment | kernel-largesmp is earlier than 0:2.6.9-55.0.2.EL | oval | oval:com.redhat.rhsa:tst:20070488011 |
comment | kernel-largesmp is signed with Red Hat master key | oval | oval:com.redhat.rhba:tst:20070304012 |
|
AND | comment | kernel-largesmp-devel is earlier than 0:2.6.9-55.0.2.EL | oval | oval:com.redhat.rhsa:tst:20070488013 |
comment | kernel-largesmp-devel is signed with Red Hat master key | oval | oval:com.redhat.rhba:tst:20070304014 |
|
AND | comment | kernel-smp is earlier than 0:2.6.9-55.0.2.EL | oval | oval:com.redhat.rhsa:tst:20070488015 |
comment | kernel-smp is signed with Red Hat master key | oval | oval:com.redhat.rhba:tst:20070304016 |
|
AND | comment | kernel-smp-devel is earlier than 0:2.6.9-55.0.2.EL | oval | oval:com.redhat.rhsa:tst:20070488017 |
comment | kernel-smp-devel is signed with Red Hat master key | oval | oval:com.redhat.rhba:tst:20070304018 |
|
AND | comment | kernel-xenU is earlier than 0:2.6.9-55.0.2.EL | oval | oval:com.redhat.rhsa:tst:20070488019 |
comment | kernel-xenU is signed with Red Hat master key | oval | oval:com.redhat.rhba:tst:20070304020 |
|
AND | comment | kernel-xenU-devel is earlier than 0:2.6.9-55.0.2.EL | oval | oval:com.redhat.rhsa:tst:20070488021 |
comment | kernel-xenU-devel is signed with Red Hat master key | oval | oval:com.redhat.rhba:tst:20070304022 |
|
|
|
|
| rhsa | id | RHSA-2007:0488 | released | 2007-06-25 | severity | Important | title | RHSA-2007:0488: kernel security update (Important) |
|
| rpms | - kernel-0:2.6.9-55.0.2.EL
- kernel-debuginfo-0:2.6.9-55.0.2.EL
- kernel-devel-0:2.6.9-55.0.2.EL
- kernel-doc-0:2.6.9-55.0.2.EL
- kernel-hugemem-0:2.6.9-55.0.2.EL
- kernel-hugemem-devel-0:2.6.9-55.0.2.EL
- kernel-largesmp-0:2.6.9-55.0.2.EL
- kernel-largesmp-devel-0:2.6.9-55.0.2.EL
- kernel-smp-0:2.6.9-55.0.2.EL
- kernel-smp-devel-0:2.6.9-55.0.2.EL
- kernel-xenU-0:2.6.9-55.0.2.EL
- kernel-xenU-devel-0:2.6.9-55.0.2.EL
- kernel-0:2.6.18-53.1.6.el5
- kernel-PAE-0:2.6.18-53.1.6.el5
- kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5
- kernel-PAE-devel-0:2.6.18-53.1.6.el5
- kernel-debug-0:2.6.18-53.1.6.el5
- kernel-debug-debuginfo-0:2.6.18-53.1.6.el5
- kernel-debug-devel-0:2.6.18-53.1.6.el5
- kernel-debuginfo-0:2.6.18-53.1.6.el5
- kernel-debuginfo-common-0:2.6.18-53.1.6.el5
- kernel-devel-0:2.6.18-53.1.6.el5
- kernel-doc-0:2.6.18-53.1.6.el5
- kernel-headers-0:2.6.18-53.1.6.el5
- kernel-kdump-0:2.6.18-53.1.6.el5
- kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5
- kernel-kdump-devel-0:2.6.18-53.1.6.el5
- kernel-xen-0:2.6.18-53.1.6.el5
- kernel-xen-debuginfo-0:2.6.18-53.1.6.el5
- kernel-xen-devel-0:2.6.18-53.1.6.el5
|
|
refmap
via4
|
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2007-10-18 | organization | Red Hat | statement | This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3. |
|
Last major update |
11-10-2017 - 01:32 |
Published |
26-06-2007 - 18:30 |
Last modified |
11-10-2017 - 01:32 |