{
  "details" : [ "umount, when running with the Linux 2.6.15 kernel on Slackware Linux 10.2, allows local users to trigger a NULL dereference and application crash by invoking the program with a pathname for a USB pen drive that was mounted and then physically removed, which might allow the users to obtain sensitive information, including core file contents." ],
  "statement" : "Red Hat does not consider this issue to be a security vulnerability.  On Red Hat Enterprise Linux  processes that change their effective UID do not dump core by default when they receive a fatal signal.  Therefore the NULL pointer dereference does not lead to an information leak.",
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2007-0822\nhttps://nvd.nist.gov/vuln/detail/CVE-2007-0822" ],
  "name" : "CVE-2007-0822",
  "csaw" : false
}