#VU95762 Improper locking in Linux kernel - CVE-2005-3106
Published: September 30, 2005 / Updated: February 15, 2024
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
Race condition in Linux 2.6, when threads are sharing memory mapping via CLONE_VM (such as linuxthreads and vfork), might allow local users to cause a denial of service (deadlock) by triggering a core dump while waiting for a thread that has just performed an exec.
Remediation
External links
- http://www.ubuntu.com/usn/usn-199-1
- http://www.debian.org/security/2005/dsa-922
- http://secunia.com/advisories/18056
- http://www.securityfocus.com/bid/15049
- http://www.redhat.com/support/errata/RHSA-2006-0101.html
- http://secunia.com/advisories/18510
- http://secunia.com/advisories/17141
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:072
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9108
- http://www.securityfocus.com/archive/1/427980/100/0/threaded
- http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.156?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c