CVE-2007-2525

Memory leak in the PPP over Ethernet (PPPoE) socket implementation in the Linux kernel before 2.6.21-git8 allows local users to cause a denial of service (memory consumption) by creating a socket using connect, and releasing it before the PPPIOCGCHAN ioctl is initialized.
References
Link Resource
http://kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.21-git8.log Patch
http://rhn.redhat.com/errata/RHSA-2007-0488.html Vendor Advisory
http://secunia.com/advisories/25163 Patch Vendor Advisory
http://secunia.com/advisories/25700 Vendor Advisory
http://secunia.com/advisories/25838 Vendor Advisory
http://secunia.com/advisories/26133 Vendor Advisory
http://secunia.com/advisories/26139 Vendor Advisory
http://secunia.com/advisories/26289 Vendor Advisory
http://secunia.com/advisories/26450 Vendor Advisory
http://secunia.com/advisories/26620 Vendor Advisory
http://secunia.com/advisories/26664 Vendor Advisory
http://secunia.com/advisories/27227 Vendor Advisory
http://secunia.com/advisories/29058 Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm
http://www.debian.org/security/2007/dsa-1356
http://www.debian.org/security/2008/dsa-1503
http://www.debian.org/security/2008/dsa-1504
http://www.mandriva.com/security/advisories?name=MDKSA-2007:171
http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
http://www.mandriva.com/security/advisories?name=MDKSA-2007:216
http://www.novell.com/linux/security/advisories/2007_51_kernel.html
http://www.novell.com/linux/security/advisories/2007_53_kernel.html
http://www.securityfocus.com/bid/23870
http://www.ubuntu.com/usn/usn-486-1
http://www.ubuntu.com/usn/usn-489-1
http://www.ubuntu.com/usn/usn-510-1
http://www.vupen.com/english/advisories/2007/1703 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/34150
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10594
https://rhn.redhat.com/errata/RHSA-2007-0376.html Vendor Advisory
http://kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.21-git8.log Patch
http://rhn.redhat.com/errata/RHSA-2007-0488.html Vendor Advisory
http://secunia.com/advisories/25163 Patch Vendor Advisory
http://secunia.com/advisories/25700 Vendor Advisory
http://secunia.com/advisories/25838 Vendor Advisory
http://secunia.com/advisories/26133 Vendor Advisory
http://secunia.com/advisories/26139 Vendor Advisory
http://secunia.com/advisories/26289 Vendor Advisory
http://secunia.com/advisories/26450 Vendor Advisory
http://secunia.com/advisories/26620 Vendor Advisory
http://secunia.com/advisories/26664 Vendor Advisory
http://secunia.com/advisories/27227 Vendor Advisory
http://secunia.com/advisories/29058 Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm
http://www.debian.org/security/2007/dsa-1356
http://www.debian.org/security/2008/dsa-1503
http://www.debian.org/security/2008/dsa-1504
http://www.mandriva.com/security/advisories?name=MDKSA-2007:171
http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
http://www.mandriva.com/security/advisories?name=MDKSA-2007:216
http://www.novell.com/linux/security/advisories/2007_51_kernel.html
http://www.novell.com/linux/security/advisories/2007_53_kernel.html
http://www.securityfocus.com/bid/23870
http://www.ubuntu.com/usn/usn-486-1
http://www.ubuntu.com/usn/usn-489-1
http://www.ubuntu.com/usn/usn-510-1
http://www.vupen.com/english/advisories/2007/1703 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/34150
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10594
https://rhn.redhat.com/errata/RHSA-2007-0376.html Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:git7:*:*:*:*:*:*

History

21 Nov 2024, 00:30

Type Values Removed Values Added
References () http://kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.21-git8.log - Patch () http://kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.21-git8.log - Patch
References () http://rhn.redhat.com/errata/RHSA-2007-0488.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2007-0488.html - Vendor Advisory
References () http://secunia.com/advisories/25163 - Patch, Vendor Advisory () http://secunia.com/advisories/25163 - Patch, Vendor Advisory
References () http://secunia.com/advisories/25700 - Vendor Advisory () http://secunia.com/advisories/25700 - Vendor Advisory
References () http://secunia.com/advisories/25838 - Vendor Advisory () http://secunia.com/advisories/25838 - Vendor Advisory
References () http://secunia.com/advisories/26133 - Vendor Advisory () http://secunia.com/advisories/26133 - Vendor Advisory
References () http://secunia.com/advisories/26139 - Vendor Advisory () http://secunia.com/advisories/26139 - Vendor Advisory
References () http://secunia.com/advisories/26289 - Vendor Advisory () http://secunia.com/advisories/26289 - Vendor Advisory
References () http://secunia.com/advisories/26450 - Vendor Advisory () http://secunia.com/advisories/26450 - Vendor Advisory
References () http://secunia.com/advisories/26620 - Vendor Advisory () http://secunia.com/advisories/26620 - Vendor Advisory
References () http://secunia.com/advisories/26664 - Vendor Advisory () http://secunia.com/advisories/26664 - Vendor Advisory
References () http://secunia.com/advisories/27227 - Vendor Advisory () http://secunia.com/advisories/27227 - Vendor Advisory
References () http://secunia.com/advisories/29058 - Vendor Advisory () http://secunia.com/advisories/29058 - Vendor Advisory
References () http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm - () http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm -
References () http://www.debian.org/security/2007/dsa-1356 - () http://www.debian.org/security/2007/dsa-1356 -
References () http://www.debian.org/security/2008/dsa-1503 - () http://www.debian.org/security/2008/dsa-1503 -
References () http://www.debian.org/security/2008/dsa-1504 - () http://www.debian.org/security/2008/dsa-1504 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:171 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:171 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:196 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:196 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:216 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:216 -
References () http://www.novell.com/linux/security/advisories/2007_51_kernel.html - () http://www.novell.com/linux/security/advisories/2007_51_kernel.html -
References () http://www.novell.com/linux/security/advisories/2007_53_kernel.html - () http://www.novell.com/linux/security/advisories/2007_53_kernel.html -
References () http://www.securityfocus.com/bid/23870 - () http://www.securityfocus.com/bid/23870 -
References () http://www.ubuntu.com/usn/usn-486-1 - () http://www.ubuntu.com/usn/usn-486-1 -
References () http://www.ubuntu.com/usn/usn-489-1 - () http://www.ubuntu.com/usn/usn-489-1 -
References () http://www.ubuntu.com/usn/usn-510-1 - () http://www.ubuntu.com/usn/usn-510-1 -
References () http://www.vupen.com/english/advisories/2007/1703 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/1703 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/34150 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/34150 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10594 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10594 -
References () https://rhn.redhat.com/errata/RHSA-2007-0376.html - Vendor Advisory () https://rhn.redhat.com/errata/RHSA-2007-0376.html - Vendor Advisory

Information

Published : 2007-05-08 23:19

Updated : 2024-11-21 00:30


NVD link : CVE-2007-2525

Mitre link : CVE-2007-2525

CVE.ORG link : CVE-2007-2525


JSON object : View

Products Affected

linux

  • linux_kernel