[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96078

 
 

909

 
 

78009

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-3731

Date: (C)2007-09-17   (M)2017-10-04
 
CVSS Score: 4.9Access Vector: LOCAL
Exploitability Subscore: 3.9Access Complexity: LOW
Impact Subscore: 6.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: COMPLETE











The Linux kernel 2.6.20 and 2.6.21 does not properly handle an invalid LDT segment selector in %cs (the xcs field) during ptrace single-step operations, which allows local users to cause a denial of service (NULL dereference and OOPS) via certain code that makes ptrace PTRACE_SETREGS and PTRACE_SINGLESTEP requests, related to the TRACE_IRQS_ON function, and possibly related to the arch_ptrace function.

Reference:
http://www.securityfocus.com/archive/1/archive/1/488972/100/0/threaded
BID-25801
SECUNIA-26935
SECUNIA-26955
SECUNIA-26978
SECUNIA-27322
SECUNIA-29159
OSVDB-37286
DSA-1378
RHSA-2007:0940
USN-518-1
http://bugzilla.kernel.org/show_bug.cgi?id=8765
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=29eb51101c02df517ca64ec472d7501127ad1da8
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=a10d9a71bafd3a283da240d2868e71346d2aef6f
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0094
https://bugzilla.redhat.com/show_bug.cgi?id=248324
https://issues.rpath.com/browse/RPL-2304

CPE    2
cpe:/o:linux:linux_kernel:2.6.21
cpe:/o:linux:linux_kernel:2.6.20
CWE    1
CWE-20

© 2013 SecPod Technologies