Vulnerability Description
Integer underflow in the cpuset_tasks_read function in the Linux kernel before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem is mounted, allows local users to obtain kernel memory contents by using a large offset when reading the /dev/cpuset/tasks file.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 2.6.20.13 |
| Debian | Debian Linux | 3.1 |
| Canonical | Ubuntu Linux | 6.06 |
Related Weaknesses (CWE)
References
- http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.13Vendor Advisory
- http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4Vendor Advisory
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=541Broken Link
- http://osvdb.org/37113Broken Link
- http://secunia.com/advisories/26133Third Party Advisory
- http://secunia.com/advisories/26139Third Party Advisory
- http://secunia.com/advisories/26620Third Party Advisory
- http://secunia.com/advisories/26647Third Party Advisory
- http://secunia.com/advisories/26760Third Party Advisory
- http://secunia.com/advisories/27227Third Party Advisory
- http://www.debian.org/security/2007/dsa-1363Third Party Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:171Third Party Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:196Third Party Advisory
- http://www.novell.com/linux/security/advisories/2007_53_kernel.htmlThird Party Advisory
- http://www.redhat.com/support/errata/RHSA-2007-0705.htmlThird Party Advisory
FAQ
What is CVE-2007-2875?
CVE-2007-2875 is a vulnerability with a CVSS score of 2.1 (LOW). Integer underflow in the cpuset_tasks_read function in the Linux kernel before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem is mounted, allows local users to obtain kernel memor...
How severe is CVE-2007-2875?
CVE-2007-2875 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2875?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux, Canonical Ubuntu Linux.