Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-4130

Опубликовано: 05 фев. 2008
Источник: debian
EPSS Низкий

Описание

The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND operation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.12-1package

Примечания

  • a fix is included in 2.6, see line 854 mempolicy.c

  • it was maybe fixed earlier, 2.6.12 is the first version in git

  • which I can see and ships the fix

EPSS

Процентиль: 14%
0.00045
Низкий

Связанные уязвимости

redhat
почти 20 лет назад

The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND operation.

nvd
почти 18 лет назад

The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND operation.

github
больше 3 лет назад

The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND operation.

EPSS

Процентиль: 14%
0.00045
Низкий