First published: Tue Dec 18 2007(Updated: )
The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances related to tmpfs, which might allow local users to read sensitive kernel data or cause a denial of service (crash).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | =2.6.11 | |
Linux kernel | =2.6.21 | |
Linux kernel | =2.6.13 | |
Linux kernel | =2.6.14 | |
Linux kernel | =2.6.22 | |
Linux kernel | =2.6.17 | |
Linux kernel | =2.6.20 | |
Linux kernel | =2.6.19 | |
Linux kernel | =2.6.16 | |
Linux kernel | =2.6.23 | |
Linux kernel | =2.6.15 | |
Linux kernel | =2.6.18 | |
Linux kernel | =2.6.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6417 is considered to have a medium severity level due to potential local exploitation leading to information leakage or denial of service.
To fix CVE-2007-6417, it is recommended to upgrade the Linux kernel to a version newer than 2.6.23, where the vulnerability has been addressed.
CVE-2007-6417 affects Linux kernel versions from 2.6.11 to 2.6.23 inclusive, specifically those using tmpfs.
The potential impacts of CVE-2007-6417 include unauthorized access to sensitive kernel data and possible system crashes.
CVE-2007-6417 can be exploited by local users with sufficient privileges on systems running affected versions of the Linux kernel.