Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

USN-509-1: Linux kernel vulnerabilities

30 August 2007

Linux kernel vulnerabilities

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

Releases

Packages

Details

A flaw in the sysfs_readdir function allowed a local user to cause a
denial of service by dereferencing a NULL pointer. (CVE-2007-3104)

A buffer overflow was discovered in the random number generator. In
environments with granular assignment of root privileges, a local attacker
could gain additional privileges. (CVE-2007-3105)

A flaw was discovered in the usblcd driver. A local attacker could cause
large amounts of kernel memory consumption, leading to a denial of service.
(CVE-2007-3513)

It was discovered that certain setuid-root processes did not correctly
reset process death signal handlers. A local user could manipulate this
to send signals to processes they would not normally have access to.
(CVE-2007-3848)

The Direct Rendering Manager for the i915 driver could be made to write
to arbitrary memory locations. An attacker with access to a running X11
session could send a specially crafted buffer and gain root privileges.
(CVE-2007-3851)

It was discovered that the aacraid SCSI driver did not correctly check
permissions on certain ioctls. A local attacker could cause a denial
of service or gain privileges. (CVE-2007-4308)

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

Related notices

  • USN-510-1: linux-image-2.6.20-16-386, linux-image-2.6.20-16-hppa32, linux-image-2.6.20-16-server, linux-image-2.6.20-16-powerpc-smp, linux-image-2.6.20-16-server-bigiron, linux-image-2.6.20-16-generic, linux-image-2.6.20-16-lowlatency, linux-image-2.6.20-16-sparc64, linux-image-2.6.20-16-powerpc64-smp, linux-source-2.6.20, linux-image-2.6.20-16-hppa64, linux-image-2.6.20-16-itanium, linux-image-2.6.20-16-powerpc, linux-image-2.6.20-16-sparc64-smp, linux-image-2.6.20-16-mckinley
  • USN-508-1: linux-image-2.6.15-29-amd64-k8, linux-image-2.6.15-29-hppa32, linux-image-2.6.15-29-sparc64, linux-image-2.6.15-29-amd64-server, linux-image-2.6.15-29-itanium, linux-image-2.6.15-29-hppa64-smp, linux-image-2.6.15-29-sparc64-smp, linux-image-2.6.15-29-powerpc64-smp, linux-image-2.6.15-29-k7, linux-image-2.6.15-29-hppa64, linux-image-2.6.15-29-server, linux-image-2.6.15-29-hppa32-smp, linux-image-2.6.15-29-amd64-xeon, linux-image-2.6.15-29-amd64-generic, linux-image-2.6.15-29-powerpc, linux-image-2.6.15-29-server-bigiron, linux-source-2.6.15, linux-image-2.6.15-29-itanium-smp, linux-image-2.6.15-29-686, linux-image-2.6.15-29-powerpc-smp, linux-image-2.6.15-29-386, linux-image-2.6.15-29-mckinley, linux-image-2.6.15-29-mckinley-smp
  • USN-489-1: linux-image-2.6.15-28-386, linux-image-2.6.15-28-amd64-generic, linux-image-2.6.15-28-server, linux-image-2.6.15-28-server-bigiron, linux-image-2.6.15-28-sparc64, linux-image-2.6.15-28-686, linux-image-2.6.15-28-amd64-server, linux-image-2.6.15-28-powerpc, linux-image-2.6.15-28-amd64-k8, linux-image-2.6.15-28-mckinley-smp, linux-image-2.6.15-28-k7, linux-image-2.6.15-28-powerpc64-smp, linux-image-2.6.15-28-powerpc-smp, linux-image-2.6.15-28-sparc64-smp, linux-image-2.6.15-28-mckinley, linux-image-2.6.15-28-amd64-xeon