[kernel-sec-discuss] r922 - active

keescook-guest at alioth.debian.org keescook-guest at alioth.debian.org
Mon Aug 20 22:35:09 UTC 2007


Author: keescook-guest
Date: 2007-08-20 22:35:09 +0000 (Mon, 20 Aug 2007)
New Revision: 922

Added:
   active/CVE-2007-3843
Modified:
   active/CVE-2007-3719
   active/CVE-2007-3848
   active/CVE-2007-3851
Log:
new issue, update Descriptions

Modified: active/CVE-2007-3719
===================================================================
--- active/CVE-2007-3719	2007-08-20 22:05:40 UTC (rev 921)
+++ active/CVE-2007-3719	2007-08-20 22:35:09 UTC (rev 922)
@@ -1,6 +1,10 @@
 Candidate: CVE-2007-3719
 References: 
 Description: 
+ The process scheduler in the Linux kernel 2.6.16 gives preference to
+ "interactive" processes that perform voluntary sleeps, which allows local
+ users to cause a denial of service (CPU consumption), as described in
+ "Secretly Monopolizing the CPU Without Superuser Privileges."
 Ubuntu-Description: 
 Notes: 
 Bugs: 

Added: active/CVE-2007-3843
===================================================================
--- active/CVE-2007-3843	                        (rev 0)
+++ active/CVE-2007-3843	2007-08-20 22:35:09 UTC (rev 922)
@@ -0,0 +1,19 @@
+Candidate: CVE-2007-3843
+References: 
+Description: 
+ The Linux kernel before 2.6.23-rc1 checks the wrong global variable
+ for the CIFS sec mount option, which might allow remote attackers to
+ spoof CIFS network traffic that the client configured for security
+ signatures, as demonstrated by lack of signing despite sec=ntlmv2i in
+ a SetupAndX request.
+Ubuntu-Description: 
+Notes: 
+Bugs: 
+upstream: 
+linux-2.6: 
+2.6.18-etch-security: 
+2.6.8-sarge-security: 
+2.4.27-sarge-security: 
+2.6.15-dapper-security: 
+2.6.17-edgy-security: 
+2.6.20-feisty-security: 

Modified: active/CVE-2007-3848
===================================================================
--- active/CVE-2007-3848	2007-08-20 22:05:40 UTC (rev 921)
+++ active/CVE-2007-3848	2007-08-20 22:35:09 UTC (rev 922)
@@ -2,6 +2,10 @@
 References: 
  http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d2d56c5f51028cb9f3d800882eb6f4cbd3f9099f
 Description: 
+ Linux kernel 2.4.35 and other versions allows local users to send
+ arbitrary signals to a child process that is running at higher privileges
+ by causing a setuid-root parent process to die, which delivers an
+ attacker-controlled parent process death signal (PR_SET_PDEATHSIG).
 Ubuntu-Description: 
 Notes: 
 Bugs: 

Modified: active/CVE-2007-3851
===================================================================
--- active/CVE-2007-3851	2007-08-20 22:05:40 UTC (rev 921)
+++ active/CVE-2007-3851	2007-08-20 22:35:09 UTC (rev 922)
@@ -2,6 +2,10 @@
 References:
  http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=21f16289270447673a7263ccc0b22d562fb01ecb
 Description: 
+ The drm/i915 component in the Linux kernel before 2.6.22.2, when used
+ with i965G and later chipsets, allows local users with access to an
+ X11 session and Direct Rendering Manager (DRM) to write to arbitrary
+ memory locations and gain privileges via a crafted batchbuffer.
 Ubuntu-Description: 
 Notes: 
  jmm> Code was introduced after 2.6.18, but backported to Etch




More information about the kernel-sec-discuss mailing list