SB2009011301 - Concurrent execution using shared resource with improper synchronization ('race condition') in Linux kernel
Published: January 13, 2009
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Concurrent execution using shared resource with improper synchronization ('race condition') (CVE-ID: CVE-2008-4307)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to concurrent execution using shared resource with improper synchronization ('race condition') error. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=456282
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26
- http://openwall.com/lists/oss-security/2009/01/13/1
- http://www.ubuntu.com/usn/usn-751-1
- http://www.redhat.com/support/errata/RHSA-2009-0451.html
- http://secunia.com/advisories/34917
- http://rhn.redhat.com/errata/RHSA-2009-0459.html
- http://secunia.com/advisories/34981
- http://www.debian.org/security/2009/dsa-1787
- http://secunia.com/advisories/34962
- http://www.debian.org/security/2009/dsa-1794
- http://secunia.com/advisories/35011
- http://secunia.com/advisories/35015
- http://rhn.redhat.com/errata/RHSA-2009-0473.html
- http://www.vupen.com/english/advisories/2009/3316
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://secunia.com/advisories/37471
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9233
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7728
- http://www.securityfocus.com/archive/1/507985/100/0/threaded
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=c4d7c402b788b73dc24f1e54a57f89d3dc5eb7bc