The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.trustix.org/errata/2007/0002/ | vendor-advisory x_refsource_TRUSTIX x_transferred |
http://secunia.com/advisories/24098 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/23609 | third-party-advisory x_refsource_SECUNIA x_transferred |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648 | vdb-entry signature x_refsource_OVAL x_transferred |
http://rhn.redhat.com/errata/RHSA-2007-0014.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://secunia.com/advisories/23436 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.securityfocus.com/bid/21663 | vdb-entry x_refsource_BID x_transferred |
http://www.mandriva.com/security/advisories?name=MDKSA-2007:040 | vendor-advisory x_refsource_MANDRIVA x_transferred |
http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm | x_refsource_CONFIRM x_transferred |
http://www.ubuntu.com/usn/usn-416-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
http://secunia.com/advisories/24100 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/30110 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.vupen.com/english/advisories/2008/2222/references | vdb-entry x_refsource_VUPEN x_transferred |
http://www.vupen.com/english/advisories/2006/5082 | vdb-entry x_refsource_VUPEN x_transferred |
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.6 | x_refsource_CONFIRM x_transferred |
http://secunia.com/advisories/33280 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/24206 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/23997 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.securityfocus.com/archive/1/471457 | mailing-list x_refsource_BUGTRAQ x_transferred |
http://secunia.com/advisories/24482 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.novell.com/linux/security/advisories/2007_18_kernel.html | vendor-advisory x_refsource_SUSE x_transferred |
http://www.debian.org/security/2008/dsa-1503 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://secunia.com/advisories/29058 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.debian.org/security/2007/dsa-1304 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://www.redhat.com/support/errata/RHSA-2008-0211.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://secunia.com/advisories/25714 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.redhat.com/support/errata/RHSA-2008-0787.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://lists.vmware.com/pipermail/security-announce/2008/000023.html | mailing-list x_refsource_MLIST x_transferred |
http://secunia.com/advisories/25691 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.mandriva.com/security/advisories?name=MDKSA-2007:060 | vendor-advisory x_refsource_MANDRIVA x_transferred |
http://secunia.com/advisories/31246 | third-party-advisory x_refsource_SECUNIA x_transferred |
The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 4.6 | MEDIUM | AV:L/AC:L/Au:S/C:N/I:N/A:C |
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
The i915 driver in (1) drivers/char/drm/i915_dma.c in the Linux kernel 2.6.24 on Debian GNU/Linux and (2) sys/dev/pci/drm/i915_drv.c in OpenBSD does not restrict the DRM_I915_HWS_ADDR ioctl to the Direct Rendering Manager (DRM) master, which allows local users to cause a denial of service (memory corruption) via a crafted ioctl call, related to absence of the DRM_MASTER and DRM_ROOT_ONLY flags in the ioctl's configuration.
ovtopmd in HP OpenView Network Node Manager (OV NNM) 6.41, 7.01, and 7.51 allows remote attackers to cause a denial of service (crash) via a crafted TCP request that triggers an out-of-bounds memory access.