First published: Tue Jun 26 2007(Updated: )
The Linux kernel before 2.6.9-42.0.8 in Red Hat 4.4 allows local users to cause a denial of service (kernel OOPS from null dereference) via fput in a 32-bit ioctl on 64-bit x86 systems, an incomplete fix of CVE-2005-3044.1.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =4.4 | |
Red Hat Enterprise Linux | =4.4 | |
Red Hat Enterprise Linux | =4.4 | |
Red Hat Enterprise Linux Desktop | =4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0773 has a medium severity rating due to its potential for causing a denial of service.
To fix CVE-2007-0773, update the Linux kernel to a version later than 2.6.9-42.0.8 for Red Hat Enterprise Linux 4.4.
CVE-2007-0773 affects local users on Red Hat Enterprise Linux 4.4 systems, specifically those running a 32-bit ioctl on 64-bit x86 systems.
The impact of CVE-2007-0773 is a kernel OOPS due to null dereference, potentially leading to system crashes or disruptions.
Currently, the best workaround for CVE-2007-0773 is to avoid the use of affected ioctl calls until the kernel is updated.