The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.trustix.org/errata/2007/0002/ | vendor-advisory x_refsource_TRUSTIX x_transferred |
| http://secunia.com/advisories/24098 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/23609 | third-party-advisory x_refsource_SECUNIA x_transferred |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648 | vdb-entry signature x_refsource_OVAL x_transferred |
| http://rhn.redhat.com/errata/RHSA-2007-0014.html | vendor-advisory x_refsource_REDHAT x_transferred |
| http://secunia.com/advisories/23436 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.securityfocus.com/bid/21663 | vdb-entry x_refsource_BID x_transferred |
| http://www.mandriva.com/security/advisories?name=MDKSA-2007:040 | vendor-advisory x_refsource_MANDRIVA x_transferred |
| http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm | x_refsource_CONFIRM x_transferred |
| http://www.ubuntu.com/usn/usn-416-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://secunia.com/advisories/24100 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/30110 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.vupen.com/english/advisories/2008/2222/references | vdb-entry x_refsource_VUPEN x_transferred |
| http://www.vupen.com/english/advisories/2006/5082 | vdb-entry x_refsource_VUPEN x_transferred |
| http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.6 | x_refsource_CONFIRM x_transferred |
| http://secunia.com/advisories/33280 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/24206 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/23997 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.securityfocus.com/archive/1/471457 | mailing-list x_refsource_BUGTRAQ x_transferred |
| http://secunia.com/advisories/24482 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.novell.com/linux/security/advisories/2007_18_kernel.html | vendor-advisory x_refsource_SUSE x_transferred |
| http://www.debian.org/security/2008/dsa-1503 | vendor-advisory x_refsource_DEBIAN x_transferred |
| http://secunia.com/advisories/29058 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.debian.org/security/2007/dsa-1304 | vendor-advisory x_refsource_DEBIAN x_transferred |
| http://www.redhat.com/support/errata/RHSA-2008-0211.html | vendor-advisory x_refsource_REDHAT x_transferred |
| http://secunia.com/advisories/25714 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.redhat.com/support/errata/RHSA-2008-0787.html | vendor-advisory x_refsource_REDHAT x_transferred |
| http://lists.vmware.com/pipermail/security-announce/2008/000023.html | mailing-list x_refsource_MLIST x_transferred |
| http://secunia.com/advisories/25691 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.mandriva.com/security/advisories?name=MDKSA-2007:060 | vendor-advisory x_refsource_MANDRIVA x_transferred |
| http://secunia.com/advisories/31246 | third-party-advisory x_refsource_SECUNIA x_transferred |
The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 4.6 | MEDIUM | AV:L/AC:L/Au:S/C:N/I:N/A:C |
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.
The nl_fib_lookup function in net/ipv4/fib_frontend.c in Linux Kernel before 2.6.20.8 allows attackers to cause a denial of service (kernel panic) via NETLINK_FIB_LOOKUP replies, which trigger infinite recursion and a stack overflow.