SB2004123101 - Race condition in Linux kernel
Published: December 31, 2004
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Race condition (CVE-ID: CVE-2004-2302)
The vulnerability allows a local user to read memory contents or crash the application.
Race condition in the sysfs_read_file and sysfs_write_file functions in Linux kernel before 2.6.10 allows local users to read kernel memory and cause a denial of service (crash) via large offsets in sysfs files.
Remediation
Install update from vendor's website.
References
- http://kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.10-rc1/2.6.10-rc1-mm1/broken-out/fix-race-in-sysfs_read_file-and-sysfs_write_file.patch
- http://linux.bkbits.net:8080/linux-2.6/cset%404186a4deVoR88JjTwMa3ZnIp-_YJsA
- http://secunia.com/advisories/17826
- http://secunia.com/advisories/18056
- http://www.debian.org/security/2005/dsa-922
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
- http://www.novell.com/linux/security/advisories/2005_44_kernel.html
- http://www.securityfocus.com/bid/13091