// For flags

CVE-2007-5966

kernel: non-root can trigger cpu_idle soft lockup

Severity Score

7.2
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information.

Desbordamiento de enteros en la función hrtimer_start en kernel/hrtimer.c en el kernel de Linux anterior a 2.6.23.10 permite a usuarios locales ejecutar código de su elección o provocar denegación de servicio (panic) a través de un valor de desconexión por tiempo. NOTA: algunos de estos detalles han sido obtenidos por terceras fuentes de información.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-11-14 CVE Reserved
  • 2007-12-20 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  • CWE-189: Numeric Errors
CAPEC
References (26)
URL Date SRC
URL Date SRC
http://www.securityfocus.com/bid/26880 2023-11-07
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.23
Search vendor "Linux" for product "Linux Kernel" and version "2.6.23"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.23
Search vendor "Linux" for product "Linux Kernel" and version "2.6.23"
rc1
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.23
Search vendor "Linux" for product "Linux Kernel" and version "2.6.23"
rc2
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.23.1
Search vendor "Linux" for product "Linux Kernel" and version "2.6.23.1"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.23.2
Search vendor "Linux" for product "Linux Kernel" and version "2.6.23.2"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.23.3
Search vendor "Linux" for product "Linux Kernel" and version "2.6.23.3"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.23.4
Search vendor "Linux" for product "Linux Kernel" and version "2.6.23.4"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.23.5
Search vendor "Linux" for product "Linux Kernel" and version "2.6.23.5"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.23.6
Search vendor "Linux" for product "Linux Kernel" and version "2.6.23.6"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.23.7
Search vendor "Linux" for product "Linux Kernel" and version "2.6.23.7"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
2.6.23.9
Search vendor "Linux" for product "Linux Kernel" and version "2.6.23.9"
-
Affected