CVE-2007-0006

Current Description

The key serial number collision avoidance code in the key_alloc_serial function in Linux kernel 2.6.9 up to 2.6.20 allows local users to cause a denial of service (crash) via vectors that trigger a null dereference, as originally reported as "spinlock CPU recursion."

Evaluator Description

The scheme for selecting serial numbers was changed from incrementing a counter to random number selection, increasing the likelihood of a serial number collision.

Basic Data

PublishedFebruary 06, 2007
Last ModifiedOctober 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:M/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score1.9
SeverityLOW
Exploitability Score3.4
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel2.6.92.6.20******
    2.3OSLinuxLinux Kernel********2.6.20

Vulnerable Software List

VendorProductVersions
Linux Linux Kernel *, 2.6.9

References

NameSourceURLTags
http://bugzilla.kernel.org/show_bug.cgi?id=7727http://bugzilla.kernel.org/show_bug.cgi?id=7727CONFIRM
24109http://secunia.com/advisories/24109SECUNIAVendor Advisory
24259http://secunia.com/advisories/24259SECUNIAVendor Advisory
24300http://secunia.com/advisories/24300SECUNIAVendor Advisory
24429http://secunia.com/advisories/24429SECUNIAVendor Advisory
24482http://secunia.com/advisories/24482SECUNIAVendor Advisory
24547http://secunia.com/advisories/24547SECUNIAVendor Advisory
24752http://secunia.com/advisories/24752SECUNIAVendor Advisory
25691http://secunia.com/advisories/25691SECUNIAVendor Advisory
MDKSA-2007:047http://www.mandriva.com/security/advisories?name=MDKSA-2007:047MANDRIVA
MDKSA-2007:060http://www.mandriva.com/security/advisories?name=MDKSA-2007:060MANDRIVA
SUSE-SA:2007:021http://www.novell.com/linux/security/advisories/2007_21_kernel.htmlSUSE
RHSA-2007:0085http://www.redhat.com/support/errata/RHSA-2007-0085.htmlREDHAT
RHSA-2007:0099http://www.redhat.com/support/errata/RHSA-2007-0099.htmlREDHAT
20070615 rPSA-2007-0124-1 kernel xenhttp://www.securityfocus.com/archive/1/471457BUGTRAQ
22539http://www.securityfocus.com/bid/22539BID
USN-451-1http://www.ubuntu.com/usn/usn-451-1UBUNTU
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=227495https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=227495CONFIRM
https://issues.rpath.com/browse/RPL-1097https://issues.rpath.com/browse/RPL-1097CONFIRM
oval:org.mitre.oval:def:9829https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9829OVAL