CVE-2007-3107
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/07/2007
Last modified:
09/04/2025
Description
The signal handling in the Linux kernel before 2.6.22, including 2.6.2, when running on PowerPC systems using HTX, allows local users to cause a denial of service via unspecified vectors involving floating point corruption and concurrency, related to clearing of MSR bits.
Impact
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.21.7 (including) | |
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245580
- http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
- http://osvdb.org/37118
- http://secunia.com/advisories/25955
- http://secunia.com/advisories/25963
- http://secunia.com/advisories/26664
- http://secunia.com/advisories/27227
- http://secunia.com/advisories/28706
- http://www.novell.com/linux/security/advisories/2007_51_kernel.html
- http://www.novell.com/linux/security/advisories/2007_53_kernel.html
- http://www.redhat.com/support/errata/RHSA-2007-0595.html
- http://www.securityfocus.com/bid/24845
- http://www.securitytracker.com/id?1018347=
- http://www.ubuntu.com/usn/usn-574-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35383
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9936
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245580
- http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
- http://osvdb.org/37118
- http://secunia.com/advisories/25955
- http://secunia.com/advisories/25963
- http://secunia.com/advisories/26664
- http://secunia.com/advisories/27227
- http://secunia.com/advisories/28706
- http://www.novell.com/linux/security/advisories/2007_51_kernel.html
- http://www.novell.com/linux/security/advisories/2007_53_kernel.html
- http://www.redhat.com/support/errata/RHSA-2007-0595.html
- http://www.securityfocus.com/bid/24845
- http://www.securitytracker.com/id?1018347=
- http://www.ubuntu.com/usn/usn-574-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35383
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9936