SB2008070102 - Concurrent execution using shared resource with improper synchronization ('race condition') in Linux kernel
Published: July 1, 2008 Updated: June 20, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Concurrent execution using shared resource with improper synchronization ('race condition') (CVE-ID: CVE-2008-2365)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to concurrent execution using shared resource with improper synchronization ('race condition') error. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- http://marc.info/?l=linux-kernel&m=117863520707703&w=2
- http://www.openwall.com/lists/oss-security/2008/06/26/1
- http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap
- https://bugzilla.redhat.com/show_bug.cgi?id=449359
- http://rhn.redhat.com/errata/RHSA-2008-0508.html
- http://www.securityfocus.com/bid/29945
- http://www.openwall.com/lists/oss-security/2008/07/14/1
- http://secunia.com/advisories/31107
- http://www.securitytracker.com/id?1020362
- http://secunia.com/advisories/30850
- http://www.ubuntu.com/usn/usn-625-1
- http://securityreason.com/securityalert/3965
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43567
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=5ecfbae093f0c37311e89b29bfc0c9d586eace87
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f358166a9405e4f1d8e50d8f415c26d95505b6de
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f5b40e363ad6041a96e3da32281d8faa191597b9