{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2007-1000", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "The ipv6_getsockopt_sticky function in net/ipv6/ipv6_sockglue.c in the Linux kernel before 2.6.20.2 allows local users to read arbitrary kernel memory via certain getsockopt calls that trigger a NULL dereference." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20070615 rPSA-2007-0124-1 kernel xen", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/471457" }, { "name" : "http://www.wslabi.com/wabisabilabi/initPublishedBid.do?", "refsource" : "MISC", "url" : "http://www.wslabi.com/wabisabilabi/initPublishedBid.do?" }, { "name" : "http://bugzilla.kernel.org/show_bug.cgi?id=8134", "refsource" : "CONFIRM", "url" : "http://bugzilla.kernel.org/show_bug.cgi?id=8134" }, { "name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.2", "refsource" : "CONFIRM", "url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.2" }, { "name" : "https://issues.rpath.com/browse/RPL-1153", "refsource" : "CONFIRM", "url" : "https://issues.rpath.com/browse/RPL-1153" }, { "name" : "FEDORA-2007-335", "refsource" : "FEDORA", "url" : "http://fedoranews.org/cms/node/2787" }, { "name" : "FEDORA-2007-336", "refsource" : "FEDORA", "url" : "http://fedoranews.org/cms/node/2788" }, { "name" : "MDKSA-2007:078", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:078" }, { "name" : "RHSA-2007:0169", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2007-0169.html" }, { "name" : "SUSE-SA:2007:029", "refsource" : "SUSE", "url" : "http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html" }, { "name" : "USN-486-1", "refsource" : "UBUNTU", "url" : "http://www.ubuntu.com/usn/usn-486-1" }, { "name" : "USN-489-1", "refsource" : "UBUNTU", "url" : "http://www.ubuntu.com/usn/usn-489-1" }, { "name" : "VU#920689", "refsource" : "CERT-VN", "url" : "http://www.kb.cert.org/vuls/id/920689" }, { "name" : "22904", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/22904" }, { "name" : "oval:org.mitre.oval:def:10015", "refsource" : "OVAL", "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10015" }, { "name" : "ADV-2007-0907", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/0907" }, { "name" : "33025", "refsource" : "OSVDB", "url" : "http://www.osvdb.org/33025" }, { "name" : "24518", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24518" }, { "name" : "24777", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24777" }, { "name" : "24901", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24901" }, { "name" : "25080", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/25080" }, { "name" : "25099", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/25099" }, { "name" : "25691", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/25691" }, { "name" : "24493", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/24493" }, { "name" : "26133", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26133" }, { "name" : "26139", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26139" } ] } }