CVE-2007-6716

fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23 does not properly zero out the dio struct, which allows local users to cause a denial of service (OOPS), as demonstrated by a certain fio test.
References
Link Resource
http://lkml.org/lkml/2007/7/30/448 Exploit Mailing List
http://www.openwall.com/lists/oss-security/2008/09/04/1 Mailing List Patch
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=848c4dd5153c7a0de55470ce99a8e13a63b4703f Mailing List Patch
https://bugzilla.redhat.com/show_bug.cgi?id=461082 Issue Tracking Patch
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23 Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0885.html Broken Link
http://secunia.com/advisories/32023 Broken Link
http://www.ubuntu.com/usn/usn-659-1 Third Party Advisory
http://secunia.com/advisories/32393 Broken Link
http://secunia.com/advisories/32799 Broken Link
http://rhn.redhat.com/errata/RHSA-2008-0972.html Third Party Advisory
http://secunia.com/advisories/32759 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html Mailing List Third Party Advisory
http://secunia.com/advisories/32103 Broken Link
http://secunia.com/advisories/32237 Broken Link
http://www.securityfocus.com/bid/31515 Third Party Advisory VDB Entry
http://www.debian.org/security/2008/dsa-1653 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:220 Broken Link
http://secunia.com/advisories/32356 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00007.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html Mailing List Third Party Advisory
http://secunia.com/advisories/32370 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10053 Third Party Advisory
Configurations

Configuration 1

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*

Information

Published : 2008-09-04 05:41

Updated : 2020-08-14 03:40


NVD link : CVE-2007-6716

Mitre link : CVE-2007-6716

Products Affected
No products.