CVE-2007-0822

Published Feb 7, 2007

Last updated 14 years ago

Overview

Description
umount, when running with the Linux 2.6.15 kernel on Slackware Linux 10.2, allows local users to trigger a NULL dereference and application crash by invoking the program with a pathname for a USB pen drive that was mounted and then physically removed, which might allow the users to obtain sensitive information, including core file contents.
Source
cve@mitre.org
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
1.9
Impact score
2.9
Exploitability score
3.4
Vector string
AV:L/AC:M/Au:N/C:P/I:N/A:N

Weaknesses

nvd@nist.gov
NVD-CWE-Other

Vendor comments

  • Red HatRed Hat does not consider this issue to be a security vulnerability. On Red Hat Enterprise Linux processes that change their effective UID do not dump core by default when they receive a fatal signal. Therefore the NULL pointer dereference does not lead to an information leak.

Configurations