Vulnerabilidad en el archivo fs/exec.c en la función do_coredump en el kernel de Linux (CVE-2007-6206)
Gravedad CVSS v2.0:
BAJA
Tipo:
CWE-200
Revelación de información
Fecha de publicación:
04/12/2007
Última modificación:
09/04/2025
Descripción
La función do_coredump en el archivo fs/exec.c en el kernel de Linux versiones 2.4.x y versiones 2.6.x hasta 2.6.24-rc3, y posiblemente otras versiones, no cambia el UID de un archivo de volcado de núcleo si éste existe antes de una creación de proceso root en un volcado de núcleo en la misma ubicación, lo que podría permitir a los usuarios locales obtener información confidencial.
Impacto
Puntuación base 2.0
2.10
Gravedad 2.0
BAJA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.4.0 (incluyendo) | 2.4.35.2 (incluyendo) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.0 (incluyendo) | 2.6.24 (excluyendo) |
cpe:2.3:o:linux:linux_kernel:2.6.24:-:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_real_time_extension:10:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_eus:4.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://bugzilla.kernel.org/show_bug.cgi?id=3043
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommitdiff%3Bh%3Dc46f739dd39db3b07ab5deb4e3ec81e1c04a91af
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
- http://lists.vmware.com/pipermail/security-announce/2008/000023.html
- http://rhn.redhat.com/errata/RHSA-2008-0055.html
- http://secunia.com/advisories/27908
- http://secunia.com/advisories/28141
- http://secunia.com/advisories/28643
- http://secunia.com/advisories/28706
- http://secunia.com/advisories/28748
- http://secunia.com/advisories/28826
- http://secunia.com/advisories/28889
- http://secunia.com/advisories/28971
- http://secunia.com/advisories/29058
- http://secunia.com/advisories/30110
- http://secunia.com/advisories/30818
- http://secunia.com/advisories/30962
- http://secunia.com/advisories/31246
- http://secunia.com/advisories/33280
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048
- http://www.debian.org/security/2007/dsa-1436
- http://www.debian.org/security/2008/dsa-1503
- http://www.debian.org/security/2008/dsa-1504
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A044
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A086
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A112
- http://www.redhat.com/support/errata/RHSA-2008-0089.html
- http://www.redhat.com/support/errata/RHSA-2008-0211.html
- http://www.redhat.com/support/errata/RHSA-2008-0787.html
- http://www.securityfocus.com/archive/1/487808/100/0/threaded
- http://www.securityfocus.com/bid/26701
- http://www.ubuntu.com/usn/usn-574-1
- http://www.ubuntu.com/usn/usn-578-1
- http://www.vupen.com/english/advisories/2007/4090
- http://www.vupen.com/english/advisories/2008/2222/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38841
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10719
- http://bugzilla.kernel.org/show_bug.cgi?id=3043
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommitdiff%3Bh%3Dc46f739dd39db3b07ab5deb4e3ec81e1c04a91af
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
- http://lists.vmware.com/pipermail/security-announce/2008/000023.html
- http://rhn.redhat.com/errata/RHSA-2008-0055.html
- http://secunia.com/advisories/27908
- http://secunia.com/advisories/28141
- http://secunia.com/advisories/28643
- http://secunia.com/advisories/28706
- http://secunia.com/advisories/28748
- http://secunia.com/advisories/28826
- http://secunia.com/advisories/28889
- http://secunia.com/advisories/28971
- http://secunia.com/advisories/29058
- http://secunia.com/advisories/30110
- http://secunia.com/advisories/30818
- http://secunia.com/advisories/30962
- http://secunia.com/advisories/31246
- http://secunia.com/advisories/33280
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048
- http://www.debian.org/security/2007/dsa-1436
- http://www.debian.org/security/2008/dsa-1503
- http://www.debian.org/security/2008/dsa-1504
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A044
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A086
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A112
- http://www.redhat.com/support/errata/RHSA-2008-0089.html
- http://www.redhat.com/support/errata/RHSA-2008-0211.html
- http://www.redhat.com/support/errata/RHSA-2008-0787.html
- http://www.securityfocus.com/archive/1/487808/100/0/threaded
- http://www.securityfocus.com/bid/26701
- http://www.ubuntu.com/usn/usn-574-1
- http://www.ubuntu.com/usn/usn-578-1
- http://www.vupen.com/english/advisories/2007/4090
- http://www.vupen.com/english/advisories/2008/2222/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38841
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10719