First published: Tue Dec 04 2007(Updated: )
The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.4.0<=2.4.35.2 | |
Linux Kernel | >=2.6.0<2.6.24 | |
Linux Kernel | =2.6.24 | |
Linux Kernel | =2.6.24-rc1 | |
Linux Kernel | =2.6.24-rc2 | |
Linux Kernel | =2.6.24-rc3 | |
openSUSE | =10.2 | |
openSUSE | =10.3 | |
SUSE Linux Enterprise Desktop with Beagle | =10-sp1 | |
SUSE Linux Enterprise Real Time Extension | =10-sp1 | |
SUSE Linux Enterprise Server | =10-sp1 | |
SUSE Linux Enterprise Software Development Kit | =10-sp1 | |
redhat enterprise Linux desktop | =4.0 | |
redhat enterprise Linux eus | =4.6 | |
redhat enterprise Linux server | =4.0 | |
redhat enterprise Linux workstation | =4.0 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =4.0 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =6.10 | |
Ubuntu Linux | =7.04 | |
Ubuntu Linux | =7.10 | |
Debian | =3.1 | |
Debian | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =6.10 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6206 is considered to have medium severity due to its potential to expose sensitive information to local users.
To fix CVE-2007-6206, you should update your Linux kernel to a version that is not vulnerable, specifically beyond 2.6.24-rc3.
CVE-2007-6206 affects Linux kernel versions 2.4.x and 2.6.x up to 2.6.24-rc3, along with certain versions of openSUSE, SUSE Linux Enterprise, Red Hat Enterprise, Debian, and Ubuntu.
CVE-2007-6206 is a local information disclosure vulnerability that occurs when a core dump file retains its original UID.
CVE-2007-6206 cannot be exploited remotely as it requires local access to the system.