CVE-2007-0997
Published Sep 18, 2007
Last updated 16 years ago
Overview
- Description
- Race condition in the tee (sys_tee) system call in the Linux kernel 2.6.17 through 2.6.17.6 might allow local users to cause a denial of service (system crash), obtain sensitive information (kernel memory contents), or gain privileges via unspecified vectors related to a potentially dropped ipipe lock during a race between two pipe readers.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.9
- Impact score
- 10
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-362
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E86E13B-EC92-47F3-94A9-DB515313011D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "980A6C7D-6175-4A44-8377-74AA7A9FD108" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C226902-04D9-4F32-866C-20225841ECF8" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "655DB612-AF49-4C17-AFB9-2E33EE8E0572" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EE30F34-EE81-4E1E-BF9F-A7A36B78B897" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1F65DF2-2794-47B7-9676-CCF150683CC6" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6555D45B-D3B3-4455-AB1E-E513F9FB6139" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FA5E262-7825-496F-AA72-0AD6DE6F3C78" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56C6C01B-4CED-4F37-A415-0603496C27DC" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE3ACE7A-A600-4ABB-B988-5D59D626DC0B" } ], "operator": "OR" } ] } ]