Upstream information

CVE-2008-0007 at MITRE

Description

Linux kernel before 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.

SUSE information

Overall state of this security issue: Ignore

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.2
Vector AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
SUSE Bugzilla entry: 353207 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Server 11 SP1
  • kernel-default >= 2.6.32.12-0.7.1
  • kernel-default-base >= 2.6.32.12-0.7.1
  • kernel-default-devel >= 2.6.32.12-0.7.1
  • kernel-default-man >= 2.6.32.12-0.7.1
  • kernel-pae >= 2.6.32.12-0.7.1
  • kernel-pae-base >= 2.6.32.12-0.7.1
  • kernel-pae-devel >= 2.6.32.12-0.7.1
  • kernel-ppc64 >= 2.6.32.12-0.7.1
  • kernel-ppc64-base >= 2.6.32.12-0.7.1
  • kernel-ppc64-devel >= 2.6.32.12-0.7.1
  • kernel-source >= 2.6.32.12-0.7.1
  • kernel-syms >= 2.6.32.12-0.7.1
  • kernel-trace >= 2.6.32.12-0.7.1
  • kernel-trace-base >= 2.6.32.12-0.7.1
  • kernel-trace-devel >= 2.6.32.12-0.7.1
  • kernel-xen >= 2.6.32.12-0.7.1
  • kernel-xen-base >= 2.6.32.12-0.7.1
  • kernel-xen-devel >= 2.6.32.12-0.7.1
Patchnames:
SUSE Linux Enterprise Server 11 SP1 GA kernel-default
SUSE Linux Enterprise Server 11 SP2
  • kernel-default >= 3.0.13-0.27.1
  • kernel-default-base >= 3.0.13-0.27.1
  • kernel-default-devel >= 3.0.13-0.27.1
  • kernel-default-man >= 3.0.13-0.27.1
  • kernel-pae >= 3.0.13-0.27.1
  • kernel-pae-base >= 3.0.13-0.27.1
  • kernel-pae-devel >= 3.0.13-0.27.1
  • kernel-ppc64 >= 3.0.13-0.27.1
  • kernel-ppc64-base >= 3.0.13-0.27.1
  • kernel-ppc64-devel >= 3.0.13-0.27.1
  • kernel-source >= 3.0.13-0.27.1
  • kernel-syms >= 3.0.13-0.27.1
  • kernel-trace >= 3.0.13-0.27.1
  • kernel-trace-base >= 3.0.13-0.27.1
  • kernel-trace-devel >= 3.0.13-0.27.1
  • kernel-xen >= 3.0.13-0.27.1
  • kernel-xen-base >= 3.0.13-0.27.1
  • kernel-xen-devel >= 3.0.13-0.27.1
Patchnames:
SUSE Linux Enterprise Server 11 SP2 GA kernel-default
SUSE Linux Enterprise Server 11 SP3
  • kernel-default >= 3.0.76-0.11.1
  • kernel-default-base >= 3.0.76-0.11.1
  • kernel-default-devel >= 3.0.76-0.11.1
  • kernel-default-man >= 3.0.76-0.11.1
  • kernel-pae >= 3.0.76-0.11.1
  • kernel-pae-base >= 3.0.76-0.11.1
  • kernel-pae-devel >= 3.0.76-0.11.1
  • kernel-ppc64 >= 3.0.76-0.11.1
  • kernel-ppc64-base >= 3.0.76-0.11.1
  • kernel-ppc64-devel >= 3.0.76-0.11.1
  • kernel-source >= 3.0.76-0.11.1
  • kernel-syms >= 3.0.76-0.11.1
  • kernel-trace >= 3.0.76-0.11.1
  • kernel-trace-base >= 3.0.76-0.11.1
  • kernel-trace-devel >= 3.0.76-0.11.1
  • kernel-xen >= 3.0.76-0.11.1
  • kernel-xen-base >= 3.0.76-0.11.1
  • kernel-xen-devel >= 3.0.76-0.11.1
Patchnames:
SUSE Linux Enterprise Server 11 SP3 GA kernel-default
SUSE Linux Enterprise Server 11 SP4
  • kernel-default >= 3.0.101-63.1
  • kernel-default-base >= 3.0.101-63.1
  • kernel-default-devel >= 3.0.101-63.1
  • kernel-default-man >= 3.0.101-63.1
  • kernel-pae >= 3.0.101-63.1
  • kernel-pae-base >= 3.0.101-63.1
  • kernel-pae-devel >= 3.0.101-63.1
  • kernel-ppc64 >= 3.0.101-63.1
  • kernel-ppc64-base >= 3.0.101-63.1
  • kernel-ppc64-devel >= 3.0.101-63.1
  • kernel-source >= 3.0.101-63.1
  • kernel-syms >= 3.0.101-63.1
  • kernel-trace >= 3.0.101-63.1
  • kernel-trace-base >= 3.0.101-63.1
  • kernel-trace-devel >= 3.0.101-63.1
  • kernel-xen >= 3.0.101-63.1
  • kernel-xen-base >= 3.0.101-63.1
  • kernel-xen-devel >= 3.0.101-63.1
Patchnames:
SUSE Linux Enterprise Server 11 SP4 GA kernel-default
SUSE Linux Enterprise Software Development Kit 11 SP4
  • kernel-docs >= 3.0.101-63.1
Patchnames:
SUSE Linux Enterprise Software Development Kit 11 SP4 GA kernel-docs
SUSE LINUX 10.1
  • kernel-bigsmp >= 2.6.16.54-0.2.5
  • kernel-debug >= 2.6.16.54-0.2.5
  • kernel-default >= 2.6.16.54-0.2.5
  • kernel-iseries64 >= 2.6.16.54-0.2.5
  • kernel-kdump >= 2.6.16.54-0.2.5
  • kernel-ppc64 >= 2.6.16.54-0.2.5
  • kernel-smp >= 2.6.16.54-0.2.5
  • kernel-source >= 2.6.16.54-0.2.5
  • kernel-syms >= 2.6.16.54-0.2.5
  • kernel-um >= 2.6.16.54-0.2.5
  • kernel-xen >= 2.6.16.54-0.2.5
  • kernel-xenpae >= 2.6.16.54-0.2.5
  • kexec-tools >= 1.101-32.45.1
  • mkinitrd >= 1.2-106.62.1
  • multipath-tools >= 0.4.6-25.23
  • open-iscsi >= 2.0.707-0.32
  • udev >= 085-30.44.1
Novell Linux Desktop 9 for x86
  • kernel-bigsmp >= 2.6.5-7.311
  • kernel-default >= 2.6.5-7.311
  • kernel-smp >= 2.6.5-7.311
  • kernel-source >= 2.6.5-7.311
  • kernel-syms >= 2.6.5-7.311
Builds
YOU Patch Nr: 12113
Open Enterprise Server
  • kernel-bigsmp >= 2.6.5-7.311
  • kernel-debug >= 2.6.5-7.311
  • kernel-default >= 2.6.5-7.311
  • kernel-smp >= 2.6.5-7.311
  • kernel-source >= 2.6.5-7.311
  • kernel-syms >= 2.6.5-7.311
  • kernel-um >= 2.6.5-7.311
  • kernel-xen >= 2.6.5-7.311
  • kernel-xenpae >= 2.6.5-7.311
  • um-host-install-initrd >= 1.0-48.26
  • um-host-kernel >= 2.6.5-7.311
Builds
YOU Patch Nr: 12113
Novell Linux Desktop 9 for x86_64
  • kernel-default >= 2.6.5-7.311
  • kernel-smp >= 2.6.5-7.311
  • kernel-source >= 2.6.5-7.311
  • kernel-syms >= 2.6.5-7.311
Builds
YOU Patch Nr: 12107