CVE-2005-3106

Race condition in Linux 2.6, when threads are sharing memory mapping via CLONE_VM (such as linuxthreads and vfork), might allow local users to cause a denial of service (deadlock) by triggering a core dump while waiting for a thread that has just performed an exec.
References
Link Resource
http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.156?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c Broken Link
http://secunia.com/advisories/17141 Broken Link
http://secunia.com/advisories/18056 Broken Link
http://secunia.com/advisories/18510 Broken Link
http://www.debian.org/security/2005/dsa-922 Mailing List
http://www.mandriva.com/security/advisories?name=MDKSA-2006:072 Patch Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2006-0101.html Broken Link
http://www.securityfocus.com/archive/1/427980/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/15049 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-199-1 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9108 Broken Link
http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.156?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c Broken Link
http://secunia.com/advisories/17141 Broken Link
http://secunia.com/advisories/18056 Broken Link
http://secunia.com/advisories/18510 Broken Link
http://www.debian.org/security/2005/dsa-922 Mailing List
http://www.mandriva.com/security/advisories?name=MDKSA-2006:072 Patch Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2006-0101.html Broken Link
http://www.securityfocus.com/archive/1/427980/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/15049 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-199-1 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9108 Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*

History

21 Nov 2024, 00:01

Type Values Removed Values Added
References () http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.156?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c - Broken Link () http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.156?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c - Broken Link
References () http://secunia.com/advisories/17141 - Broken Link () http://secunia.com/advisories/17141 - Broken Link
References () http://secunia.com/advisories/18056 - Broken Link () http://secunia.com/advisories/18056 - Broken Link
References () http://secunia.com/advisories/18510 - Broken Link () http://secunia.com/advisories/18510 - Broken Link
References () http://www.debian.org/security/2005/dsa-922 - Mailing List () http://www.debian.org/security/2005/dsa-922 - Mailing List
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:072 - Patch, Third Party Advisory () http://www.mandriva.com/security/advisories?name=MDKSA-2006:072 - Patch, Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2006-0101.html - Broken Link () http://www.redhat.com/support/errata/RHSA-2006-0101.html - Broken Link
References () http://www.securityfocus.com/archive/1/427980/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/427980/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/15049 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/15049 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/usn-199-1 - Third Party Advisory () http://www.ubuntu.com/usn/usn-199-1 - Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9108 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9108 - Broken Link

15 Feb 2024, 20:19

Type Values Removed Values Added
CWE NVD-CWE-Other CWE-667
CVSS v2 : 1.2
v3 : unknown
v2 : 1.2
v3 : 4.7
CPE cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
References (UBUNTU) http://www.ubuntu.com/usn/usn-199-1 - (UBUNTU) http://www.ubuntu.com/usn/usn-199-1 - Third Party Advisory
References (FEDORA) http://www.securityfocus.com/archive/1/427980/100/0/threaded - (FEDORA) http://www.securityfocus.com/archive/1/427980/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (DEBIAN) http://www.debian.org/security/2005/dsa-922 - (DEBIAN) http://www.debian.org/security/2005/dsa-922 - Mailing List
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2006:072 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2006:072 - Patch, Third Party Advisory
References (BID) http://www.securityfocus.com/bid/15049 - (BID) http://www.securityfocus.com/bid/15049 - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/18056 - (SECUNIA) http://secunia.com/advisories/18056 - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9108 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9108 - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2006-0101.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2006-0101.html - Broken Link
References () http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.156?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c - () http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.156?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c - Broken Link
References (SECUNIA) http://secunia.com/advisories/18510 - (SECUNIA) http://secunia.com/advisories/18510 - Broken Link
References (SECUNIA) http://secunia.com/advisories/17141 - (SECUNIA) http://secunia.com/advisories/17141 - Broken Link
First Time Debian
Canonical
Canonical ubuntu Linux
Debian debian Linux

07 Nov 2023, 01:57

Type Values Removed Values Added
References
  • {'url': 'http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c@1.156?nav=index.html|src/|src/fs|hist/fs/exec.c', 'name': 'http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c@1.156?nav=index.html|src/|src/fs|hist/fs/exec.c', 'tags': ['Broken Link'], 'refsource': 'CONFIRM'}
  • () http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.156?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c -

Information

Published : 2005-09-30 10:05

Updated : 2024-11-21 00:01


NVD link : CVE-2005-3106

Mitre link : CVE-2005-3106

CVE.ORG link : CVE-2005-3106


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel

canonical

  • ubuntu_linux
CWE
CWE-667

Improper Locking