CVE-2007-1592

Scores

EPSS

0.000none0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

4.9medium2.0
0246810

CVSS Score: 4.9/10

All CVSS Scores

CVSS 2.0
4.9

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Description

net/ipv6/tcp_ipv6.c in Linux kernel 2.6.x up to 2.6.21-rc3 inadvertently copies the ipv6_fl_socklist from a listening TCP socket to child sockets, which allows local users to cause a denial of service (OOPS) or double free by opening a listening IPv6 socket, attaching a flow label, and connecting to that socket.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvd

CWEs

CWE-119

Recommendations

Source: nvd

Before applying this update, make sure that all previously releasederrata relevant to your system have been applied. Use Red HatNetwork to download and update your packages. To launch the Red HatUpdate Agent, use the following command:
up2date
For information on how to install packages manually, refer to thefollowing Web page for the System Administration or Customizationguide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/

URL: http://rhn.redhat.com/errata/RHSA-2007-0436.html

Source: nvd

Before applying this update, make sure that all previously-releasederrata relevant to your system have been applied. Use Red HatNetwork to download and update your packages. To launch the Red HatUpdate Agent, use the following command:
up2date
For information on how to install packages manually, refer to thefollowing Web page for the System Administration or Customizationguide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/

URL: http://rhn.redhat.com/errata/RHBA-2007-0304.html

Vulnerable Software (2)

Type: Configuration

Product: linux-2.6

Operating System: debian

Trait:
{  "fixed": "2.6.20-1"}

Source: debian

Type: Configuration

Vendor: linux

Product: linux_kernel

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*...

Source: nvd