CVE-2007-2525

Scores

EPSS

0.000none0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

4.9medium2.0
0246810

CVSS Score: 4.9/10

All CVSS Scores

CVSS 2.0
4.9

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Description

Memory leak in the PPP over Ethernet (PPPoE) socket implementation in the Linux kernel before 2.6.21-git8 allows local users to cause a denial of service (memory consumption) by creating a socket using connect, and releasing it before the PPPIOCGCHAN ioctl is initialized.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvd

Related Vulnerabilities

BDU:2015-03581BDU:2015-03582BDU:2015-03583BDU:2015-03584BDU:2015-03585BDU:2015-03586BDU:2015-03587BDU:2015-03588BDU:2015-03589BDU:2015-03590BDU:2015-03591BDU:2015-03592BDU:2015-03593BDU:2015-03594BDU:2015-03595BDU:2015-03596BDU:2015-03597BDU:2015-03598BDU:2015-03599BDU:2015-03600BDU:2015-03601BDU:2015-03602BDU:2015-03603BDU:2015-03604BDU:2015-03605BDU:2015-03606BDU:2015-03607BDU:2015-03608BDU:2015-03609BDU:2015-03610BDU:2015-03611BDU:2015-03612BDU:2015-03613BDU:2015-03614BDU:2015-03615BDU:2015-03616BDU:2015-03617BDU:2015-03618BDU:2015-03619BDU:2015-03620BDU:2015-03621BDU:2015-03622BDU:2015-03623BDU:2015-03624BDU:2015-03625BDU:2015-03626BDU:2015-03627BDU:2015-03628BDU:2015-03629BDU:2015-03630BDU:2015-03631BDU:2015-03632BDU:2015-03633BDU:2015-03634BDU:2015-03635BDU:2015-03636BDU:2015-03637BDU:2015-03638BDU:2015-03639BDU:2015-03640BDU:2015-03641BDU:2015-03642BDU:2015-03643BDU:2015-03644BDU:2015-03645BDU:2015-03646BDU:2015-03647BDU:2015-03648BDU:2015-03649BDU:2015-03650BDU:2015-03651BDU:2015-03652BDU:2015-03653BDU:2015-03654BDU:2015-04220BDU:2015-04221BDU:2015-04222BDU:2015-04223BDU:2015-04224BDU:2015-04225BDU:2015-04726BDU:2015-04727BDU:2015-04728BDU:2015-04729BDU:2015-04730BDU:2015-04731BDU:2015-04732BDU:2015-04733BDU:2015-04734BDU:2015-04735BDU:2015-04736BDU:2015-04737BDU:2015-04738BDU:2015-04739BDU:2015-04740BDU:2015-04741BDU:2015-04742BDU:2015-04743BDU:2015-04744BDU:2015-04745BDU:2015-04746BDU:2015-04747BDU:2015-04748BDU:2015-04749BDU:2015-04750BDU:2015-04751BDU:2015-04752BDU:2015-04753BDU:2015-04754BDU:2015-04755BDU:2015-04756BDU:2015-04757BDU:2015-04758BDU:2015-04759BDU:2015-04760BDU:2015-04761BDU:2015-04762BDU:2015-04763BDU:2015-04764BDU:2015-04765BDU:2015-04766BDU:2015-04767BDU:2015-04768BDU:2015-04769BDU:2015-04770BDU:2015-04771BDU:2015-04772BDU:2015-04773BDU:2015-04774BDU:2015-04775BDU:2015-04776BDU:2015-04777BDU:2015-04778BDU:2015-04779BDU:2015-04780BDU:2015-04781BDU:2015-04782BDU:2015-04783BDU:2015-04784BDU:2015-04785BDU:2015-04786BDU:2015-04787BDU:2015-04898BDU:2015-04899BDU:2015-04900BDU:2015-04901BDU:2015-04902BDU:2015-04903BDU:2015-04904BDU:2015-04905BDU:2015-04906BDU:2015-04907BDU:2015-04908BDU:2015-04909BDU:2015-04910BDU:2015-04911BDU:2015-04912BDU:2015-04913BDU:2015-04914BDU:2015-04915BDU:2015-04916BDU:2015-04917BDU:2015-04967BDU:2015-04968

Recommendations

Source: nvd

Before applying this update, make sure that all previously-releasederrata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available athttp://kbase.redhat.com/faq/FAQ_58_10188

URL: https://rhn.redhat.com/errata/RHSA-2007-0376.html

Vulnerable Software (2)

Type: Configuration

Product: linux-2.6

Operating System: debian

Trait:
{  "fixed": "2.6.22-1"}

Source: debian

Type: Configuration

Vendor: linux

Product: linux_kernel

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:linux:linux_kernel:*:git7:*:*:*:*:*:*",      "versionEndIncluding": "2.6.21",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd