Race condition in Linux kernel - CVE-2008-5182
Published: November 21, 2008 / Updated: October 11, 2018
Vulnerability identifier: #VU95201
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2008-5182
CWE-ID: CWE-362
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to execute arbitrary code.
The inotify functionality in Linux kernel 2.6 before 2.6.28-rc5 might allow local users to gain privileges via unknown vectors related to race conditions in inotify watch removal and umount.
How to mitigate CVE-2008-5182
Install update from vendor's repository.
Sources
- http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc5
- http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00010.html
- http://secunia.com/advisories/32998
- http://secunia.com/advisories/33083
- http://secunia.com/advisories/33348
- http://secunia.com/advisories/33623
- http://secunia.com/advisories/33641
- http://secunia.com/advisories/33704
- http://secunia.com/advisories/33706
- http://secunia.com/advisories/33756
- http://secunia.com/advisories/33854
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0332
- http://www.debian.org/security/2008/dsa-1681
- http://www.redhat.com/support/errata/RHSA-2009-0053.html
- http://www.redhat.com/support/errata/RHSA-2009-0225.html
- http://www.securityfocus.com/archive/1/499044/100/0/threaded
- http://www.securityfocus.com/bid/33503
- http://www.ubuntu.com/usn/usn-715-1
- https://issues.rpath.com/browse/RPL-2915
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10584
- https://usn.ubuntu.com/714-1/
- https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01358.html