CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
AI Score
Confidence
Low
EPSS
Percentile
95.1%
The kernel key management code did not correctly handle key reuse. A
local attacker could create many key requests, leading to a denial of
service. (CVE-2007-0006)
The kernel NFS code did not correctly validate NFSACL2 ACCESS requests.
If a system was serving NFS mounts, a remote attacker could send a
specially crafted packet, leading to a denial of service.
(CVE-2007-0772)
When dumping core, the kernel did not correctly handle PT_INTERP
processes. A local attacker could create situations where they could
read the contents of otherwise unreadable executable programs.
(CVE-2007-0958)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 6.10 | noarch | linux-image-2.6.17-11-generic | < 2.6.17.1-11.37 | UNKNOWN |
Ubuntu | 6.10 | noarch | linux-image-2.6.17-11-server-bigiron | < 2.6.17.1-11.37 | UNKNOWN |
Ubuntu | 6.10 | noarch | linux-image-2.6.17-11-sparc64-smp | < 2.6.17.1-11.37 | UNKNOWN |
Ubuntu | 6.10 | noarch | linux-image-2.6.17-11-powerpc | < 2.6.17.1-11.37 | UNKNOWN |
Ubuntu | 6.10 | noarch | linux-image-2.6.17-11-386 | < 2.6.17.1-11.37 | UNKNOWN |
Ubuntu | 6.10 | noarch | linux-image-2.6.17-11-powerpc-smp | < 2.6.17.1-11.37 | UNKNOWN |
Ubuntu | 6.10 | noarch | linux-image-2.6.17-11-sparc64 | < 2.6.17.1-11.37 | UNKNOWN |
Ubuntu | 6.10 | noarch | linux-image-2.6.17-11-server | < 2.6.17.1-11.37 | UNKNOWN |
Ubuntu | 6.10 | noarch | linux-image-2.6.17-11-powerpc64-smp | < 2.6.17.1-11.37 | UNKNOWN |
Ubuntu | 6.06 | noarch | linux-image-2.6.15-28-amd64-generic | < 2.6.15-28.53 | UNKNOWN |