1.9
CVSSv2

CVE-2007-3848

Published: 14/08/2007 Updated: 15/10/2018
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
VMScore: 169
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Linux kernel 2.4.35 and other versions allows local users to send arbitrary signals to a child process that is running at higher privileges by causing a setuid-root parent process to die, which delivers an attacker-controlled parent process death signal (PR_SET_PDEATHSIG).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix a number of security issues are nowavailable for Red Hat Enterprise Linux 21 running on 64-bit architecturesThis update has been rated as having important security impact by the Red ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix a number of security issues are nowavailable for Red Hat Enterprise Linux 21 running on 32-bit architecturesThis update has been rated as having important security impact by the Red ...
A flaw in the sysfs_readdir function allowed a local user to cause a denial of service by dereferencing a NULL pointer (CVE-2007-3104) ...
A buffer overflow was discovered in the Moxa serial driver Local attackers could execute arbitrary code and gain root privileges (CVE-2005-0504) ...
A flaw was discovered in the PPP over Ethernet implementation Local attackers could manipulate ioctls and cause kernel memory consumption leading to a denial of service (CVE-2007-2525) ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-1353 Ilja van Sprundel discovered that kernel memory could be leaked via the Bluetooth setsoc ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2004-2731 infamous41md reported multiple integer overflows in the Sbus PROM driver that would allo ...

References

NVD-CWE-Otherhttp://marc.info/?l=openwall-announce&m=118710356812637&w=2http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-3848http://marc.info/?l=bugtraq&m=118711306802632&w=2https://issues.rpath.com/browse/RPL-1648http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.4http://support.avaya.com/elmodocs2/security/ASA-2007-474.htmhttp://www.debian.org/security/2007/dsa-1356http://www.mandriva.com/security/advisories?name=MDKSA-2007:196http://www.mandriva.com/security/advisories?name=MDKSA-2007:195http://www.redhat.com/support/errata/RHSA-2007-0940.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0939.htmlhttp://www.redhat.com/support/errata/RHSA-2007-1049.htmlhttp://www.novell.com/linux/security/advisories/2007_53_kernel.htmlhttp://www.ubuntu.com/usn/usn-510-1http://www.ubuntu.com/usn/usn-508-1http://www.ubuntu.com/usn/usn-509-1http://www.securityfocus.com/bid/25387http://secunia.com/advisories/26500http://secunia.com/advisories/26450http://secunia.com/advisories/26643http://secunia.com/advisories/26651http://secunia.com/advisories/27322http://secunia.com/advisories/27436http://secunia.com/advisories/26664http://secunia.com/advisories/27212http://secunia.com/advisories/27227http://secunia.com/advisories/27747http://secunia.com/advisories/27913http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.htmlhttp://secunia.com/advisories/28806http://www.debian.org/security/2008/dsa-1503http://www.debian.org/security/2008/dsa-1504http://secunia.com/advisories/29058http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.htmlhttp://secunia.com/advisories/29570http://www.redhat.com/support/errata/RHSA-2008-0787.htmlhttp://secunia.com/advisories/33280https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10120http://www.securityfocus.com/archive/1/476803/100/0/threadedhttp://www.securityfocus.com/archive/1/476677/100/0/threadedhttp://www.securityfocus.com/archive/1/476538/100/0/threadedhttp://www.securityfocus.com/archive/1/476464/100/0/threadedhttps://access.redhat.com/errata/RHSA-2008:0787https://nvd.nist.govhttps://usn.ubuntu.com/509-1/