First published: Mon Jun 11 2007(Updated: )
Integer underflow in the cpuset_tasks_read function in the Linux kernel before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem is mounted, allows local users to obtain kernel memory contents by using a large offset when reading the /dev/cpuset/tasks file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <2.6.20.13 | |
Linux kernel | >=2.6.21<2.6.21.4 | |
Debian | =3.1 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.04 | |
Ubuntu Linux | =6.10 | |
Linux Kernel | <2.6.20.13 | |
Linux Kernel | >=2.6.21<2.6.21.4 | |
Ubuntu | =6.06 | |
Ubuntu | =6.10 | |
Ubuntu | =7.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2875 has a moderate severity level due to its potential for local users to access sensitive kernel memory.
To fix CVE-2007-2875, update the Linux kernel to version 2.6.20.13 or later, or to version 2.6.21.4 or later.
CVE-2007-2875 affects Linux kernel versions before 2.6.20.13, as well as 2.6.21 versions before 2.6.21.4, alongside specific Debian and Ubuntu distributions.
Exploiting CVE-2007-2875 allows a local user to read sensitive kernel memory which can lead to information disclosure.
No, CVE-2007-2875 can only be exploited by local users with access to the system.