Vulnerability Description
The ipv6_getsockopt_sticky function in net/ipv6/ipv6_sockglue.c in the Linux kernel before 2.6.20.2 allows local users to read arbitrary kernel memory via certain getsockopt calls that trigger a NULL dereference.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 2.6.20.1 |
References
- http://bugzilla.kernel.org/show_bug.cgi?id=8134
- http://fedoranews.org/cms/node/2787
- http://fedoranews.org/cms/node/2788
- http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html
- http://secunia.com/advisories/24493
- http://secunia.com/advisories/24518
- http://secunia.com/advisories/24777
- http://secunia.com/advisories/24901
- http://secunia.com/advisories/25080
- http://secunia.com/advisories/25099
- http://secunia.com/advisories/25691
- http://secunia.com/advisories/26133
- http://secunia.com/advisories/26139
- http://www.kb.cert.org/vuls/id/920689US Government Resource
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.2
FAQ
What is CVE-2007-1000?
CVE-2007-1000 is a vulnerability with a CVSS score of 7.2 (HIGH). The ipv6_getsockopt_sticky function in net/ipv6/ipv6_sockglue.c in the Linux kernel before 2.6.20.2 allows local users to read arbitrary kernel memory via certain getsockopt calls that trigger a NULL ...
How severe is CVE-2007-1000?
CVE-2007-1000 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-1000?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.