On Mon, May 12, 2008 at 11:52:27PM +0100, Dominic Hargreaves wrote:
> On Mon, May 12, 2008 at 03:13:14PM -0600, dann frazier wrote:
> 
> > Vulnerability  : denial of service
> 
> > CVE-2008-1669
> > 
> >     Alexander Viro discovered a race condition in the fcntl code that
> >     may permit local users on multi-processor systems to execute parallel
> >     code paths that are otherwise prohibited and gain re-ordered access
> >     to the descriptor table.
> 
> Is there any reason this has been labelled as a DoS rather than an
> potential arbitrary code execution issue (which
> http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1669 suggests it is) - eg
> are there mitigating circumstances in the Debian kernel?

hey Dominic,
 At the time I prepared this upload, I was under the impression that
this was a potential arbitrary code execution issue (with no known
exploit). However, while preparing the DSA I didn't find convincing
evidence that this was more than a DoS. I could of course be wrong,
and if I am I'll be happy to update the advisory.

> It seems odd that Debian would release a new kernel for a single
> DoS-only vulnerability.

Yes, normally local DoS fixes are queued up and released in batches.

-- 
dann frazier


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to