Computer Security
[EN] securityvulns.ru no-pyccku


Multiple Linux kernel vulnerabilities
Published:17.08.2007
Source:
SecurityVulns ID:8065
Type:remote
Threat Level:
6/10
Description:nf_conntrack_h323 NULL pointer dereference, invalid suid applications parent process termination signal handling, privilege escalation on Intel 965 chipset.
Affected:LINUX : kernel 2.4
 LINUX : kernel 2.6
CVE:CVE-2007-3851 (The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.)
 CVE-2007-3848 (Linux kernel 2.4.35 and other versions allows local users to send arbitrary signals to a child process that is running at higher privileges by causing a setuid-root parent process to die, which delivers an attacker-controlled parent process death signal (PR_SET_PDEATHSIG).)
 CVE-2007-3642 (The decode_choice function in net/netfilter/nf_conntrack_h323_asn1.c in the Linux kernel before 2.6.20.15, 2.6.21.x before 2.6.21.6, and before 2.6.22 allows remote attackers to cause a denial of service (crash) via an encoded, out-of-range index value for a choice field, which triggers a NULL pointer dereference.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1356-1] New Linux 2.6.18 packages fix several vulnerabilities (17.08.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod