CVE-2006-4342

The kernel in Red Hat Enterprise Linux 3, when running on SMP systems, allows local users to cause a denial of service (deadlock) by running the shmat function on an shm at the same time that shmctl is removing that shm (IPC_RMID), which prevents a spinlock from being unlocked.
Configurations

Configuration 1 (hide)

cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:15

Type Values Removed Values Added
References () http://secunia.com/advisories/22497 - Broken Link () http://secunia.com/advisories/22497 - Broken Link
References () http://secunia.com/advisories/23064 - Broken Link () http://secunia.com/advisories/23064 - Broken Link
References () http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm - Third Party Advisory () http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm - Third Party Advisory
References () http://www.kb.cert.org/vuls/id/245984 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/245984 - Third Party Advisory, US Government Resource
References () http://www.redhat.com/support/errata/RHSA-2006-0710.html - Broken Link () http://www.redhat.com/support/errata/RHSA-2006-0710.html - Broken Link
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205618 - Exploit, Issue Tracking () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205618 - Exploit, Issue Tracking
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9649 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9649 - Broken Link

15 Feb 2024, 20:17

Type Values Removed Values Added
References (CONFIRM) https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205618 - Exploit (CONFIRM) https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205618 - Exploit, Issue Tracking
References (CERT-VN) http://www.kb.cert.org/vuls/id/245984 - US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/245984 - Third Party Advisory, US Government Resource
References (CONFIRM) http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm - (CONFIRM) http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/23064 - (SECUNIA) http://secunia.com/advisories/23064 - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9649 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9649 - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2006-0710.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2006-0710.html - Broken Link
References (SECUNIA) http://secunia.com/advisories/22497 - (SECUNIA) http://secunia.com/advisories/22497 - Broken Link
CWE NVD-CWE-Other CWE-667
CVSS v2 : 4.0
v3 : unknown
v2 : 4.0
v3 : 5.5

Information

Published : 2006-10-17 17:07

Updated : 2024-11-21 00:15


NVD link : CVE-2006-4342

Mitre link : CVE-2006-4342

CVE.ORG link : CVE-2006-4342


JSON object : View

Products Affected

redhat

  • enterprise_linux
CWE
CWE-667

Improper Locking