SB2005030702 - Race condition in Linux kernel
Published: March 7, 2005
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Race condition (CVE-ID: CVE-2005-0178)
The vulnerability allows a local user to execute arbitrary code.
Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores.
Remediation
Install update from vendor's website.
References
- http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
- http://linux.bkbits.net:8080/linux-2.6/cset@41ddda70CWJb5nNL71T4MOlG2sMG8A
- http://marc.info/?l=full-disclosure&m=110846102231365&w=2
- http://www.redhat.com/support/errata/RHSA-2005-092.html
- http://www.securityfocus.com/bid/12598
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10647