Vulnerability Description
The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND operation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux | 4.0 |
| Redhat | Enterprise Linux Desktop | 4 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2008-0055.htmlPatch
- http://secunia.com/advisories/28748Vendor Advisory
- http://www.securityfocus.com/bid/27556
- https://bugzilla.redhat.com/show_bug.cgi?id=179665Exploit
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://rhn.redhat.com/errata/RHSA-2008-0055.htmlPatch
- http://secunia.com/advisories/28748Vendor Advisory
- http://www.securityfocus.com/bid/27556
- https://bugzilla.redhat.com/show_bug.cgi?id=179665Exploit
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
FAQ
What is CVE-2007-4130?
CVE-2007-4130 is a vulnerability with a CVSS score of 7.2 (HIGH). The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial...
How severe is CVE-2007-4130?
CVE-2007-4130 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4130?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux, Redhat Enterprise Linux Desktop.