#VU95213 Information exposure in Linux kernel - CVE-2007-6206


| Updated: 2020-08-12

Vulnerability identifier: #VU95213

Vulnerability risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2007-6206

CWE-ID: CWE-200

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information exposure error within the do_coredump() function in fs/exec.c. A local user can gain access to sensitive information.

Mitigation
Install update from vendor's repository.

Vulnerable software versions

Linux kernel: All versions


External links
https://bugzilla.kernel.org/show_bug.cgi?id=3043
https://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=c46f739dd39db3b07ab5deb4e3ec81e1c04a91af
https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html
https://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
https://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
https://lists.vmware.com/pipermail/security-announce/2008/000023.html
https://rhn.redhat.com/errata/RHSA-2008-0055.html
https://secunia.com/advisories/27908
https://secunia.com/advisories/28141
https://secunia.com/advisories/28643
https://secunia.com/advisories/28706
https://secunia.com/advisories/28748
https://secunia.com/advisories/28826
https://secunia.com/advisories/28889
https://secunia.com/advisories/28971
https://secunia.com/advisories/29058
https://secunia.com/advisories/30110
https://secunia.com/advisories/30818
https://secunia.com/advisories/30962
https://secunia.com/advisories/31246
https://secunia.com/advisories/33280
https://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048
https://www.debian.org/security/2007/dsa-1436
https://www.debian.org/security/2008/dsa-1503
https://www.debian.org/security/2008/dsa-1504
https://www.mandriva.com/security/advisories?name=MDVSA-2008:044
https://www.mandriva.com/security/advisories?name=MDVSA-2008:086
https://www.mandriva.com/security/advisories?name=MDVSA-2008:112
https://www.redhat.com/support/errata/RHSA-2008-0089.html
https://www.redhat.com/support/errata/RHSA-2008-0211.html
https://www.redhat.com/support/errata/RHSA-2008-0787.html
https://www.securityfocus.com/archive/1/487808/100/0/threaded
https://www.securityfocus.com/bid/26701
https://www.ubuntu.com/usn/usn-574-1
https://www.ubuntu.com/usn/usn-578-1
https://www.vupen.com/english/advisories/2007/4090
https://www.vupen.com/english/advisories/2008/2222/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/38841
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10719


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability