SB2005093001 - Improper locking in Linux kernel
Published: September 30, 2005
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper locking (CVE-ID: CVE-2005-3106)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
Race condition in Linux 2.6, when threads are sharing memory mapping via CLONE_VM (such as linuxthreads and vfork), might allow local users to cause a denial of service (deadlock) by triggering a core dump while waiting for a thread that has just performed an exec.
Remediation
Install update from vendor's website.
References
- http://www.ubuntu.com/usn/usn-199-1
- http://www.debian.org/security/2005/dsa-922
- http://secunia.com/advisories/18056
- http://www.securityfocus.com/bid/15049
- http://www.redhat.com/support/errata/RHSA-2006-0101.html
- http://secunia.com/advisories/18510
- http://secunia.com/advisories/17141
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:072
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9108
- http://www.securityfocus.com/archive/1/427980/100/0/threaded
- http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.156?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c