[kernel-sec-discuss] r922 - active
keescook-guest at alioth.debian.org
keescook-guest at alioth.debian.org
Mon Aug 20 22:35:09 UTC 2007
Author: keescook-guest
Date: 2007-08-20 22:35:09 +0000 (Mon, 20 Aug 2007)
New Revision: 922
Added:
active/CVE-2007-3843
Modified:
active/CVE-2007-3719
active/CVE-2007-3848
active/CVE-2007-3851
Log:
new issue, update Descriptions
Modified: active/CVE-2007-3719
===================================================================
--- active/CVE-2007-3719 2007-08-20 22:05:40 UTC (rev 921)
+++ active/CVE-2007-3719 2007-08-20 22:35:09 UTC (rev 922)
@@ -1,6 +1,10 @@
Candidate: CVE-2007-3719
References:
Description:
+ The process scheduler in the Linux kernel 2.6.16 gives preference to
+ "interactive" processes that perform voluntary sleeps, which allows local
+ users to cause a denial of service (CPU consumption), as described in
+ "Secretly Monopolizing the CPU Without Superuser Privileges."
Ubuntu-Description:
Notes:
Bugs:
Added: active/CVE-2007-3843
===================================================================
--- active/CVE-2007-3843 (rev 0)
+++ active/CVE-2007-3843 2007-08-20 22:35:09 UTC (rev 922)
@@ -0,0 +1,19 @@
+Candidate: CVE-2007-3843
+References:
+Description:
+ The Linux kernel before 2.6.23-rc1 checks the wrong global variable
+ for the CIFS sec mount option, which might allow remote attackers to
+ spoof CIFS network traffic that the client configured for security
+ signatures, as demonstrated by lack of signing despite sec=ntlmv2i in
+ a SetupAndX request.
+Ubuntu-Description:
+Notes:
+Bugs:
+upstream:
+linux-2.6:
+2.6.18-etch-security:
+2.6.8-sarge-security:
+2.4.27-sarge-security:
+2.6.15-dapper-security:
+2.6.17-edgy-security:
+2.6.20-feisty-security:
Modified: active/CVE-2007-3848
===================================================================
--- active/CVE-2007-3848 2007-08-20 22:05:40 UTC (rev 921)
+++ active/CVE-2007-3848 2007-08-20 22:35:09 UTC (rev 922)
@@ -2,6 +2,10 @@
References:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d2d56c5f51028cb9f3d800882eb6f4cbd3f9099f
Description:
+ Linux kernel 2.4.35 and other versions allows local users to send
+ arbitrary signals to a child process that is running at higher privileges
+ by causing a setuid-root parent process to die, which delivers an
+ attacker-controlled parent process death signal (PR_SET_PDEATHSIG).
Ubuntu-Description:
Notes:
Bugs:
Modified: active/CVE-2007-3851
===================================================================
--- active/CVE-2007-3851 2007-08-20 22:05:40 UTC (rev 921)
+++ active/CVE-2007-3851 2007-08-20 22:35:09 UTC (rev 922)
@@ -2,6 +2,10 @@
References:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=21f16289270447673a7263ccc0b22d562fb01ecb
Description:
+ The drm/i915 component in the Linux kernel before 2.6.22.2, when used
+ with i965G and later chipsets, allows local users with access to an
+ X11 session and Direct Rendering Manager (DRM) to write to arbitrary
+ memory locations and gain privileges via a crafted batchbuffer.
Ubuntu-Description:
Notes:
jmm> Code was introduced after 2.6.18, but backported to Etch
More information about the kernel-sec-discuss
mailing list