CVE-2008-2365

Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user's process that trigger a conflict between utrace_detach and report_quiescent, related to "late ptrace_may_attach() check" and "race around &dead_engine_ops setting," a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=5ecfbae093f0c37311e89b29bfc0c9d586eace87
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f358166a9405e4f1d8e50d8f415c26d95505b6de
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f5b40e363ad6041a96e3da32281d8faa191597b9
http://marc.info/?l=linux-kernel&m=117863520707703&w=2
http://rhn.redhat.com/errata/RHSA-2008-0508.html Patch
http://secunia.com/advisories/30850 Vendor Advisory
http://secunia.com/advisories/31107 Vendor Advisory
http://securityreason.com/securityalert/3965
http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap
http://www.openwall.com/lists/oss-security/2008/06/26/1 Patch
http://www.openwall.com/lists/oss-security/2008/07/14/1
http://www.securityfocus.com/bid/29945
http://www.securitytracker.com/id?1020362
http://www.ubuntu.com/usn/usn-625-1
https://bugzilla.redhat.com/show_bug.cgi?id=449359
https://exchange.xforce.ibmcloud.com/vulnerabilities/43567
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=5ecfbae093f0c37311e89b29bfc0c9d586eace87
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f358166a9405e4f1d8e50d8f415c26d95505b6de
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f5b40e363ad6041a96e3da32281d8faa191597b9
http://marc.info/?l=linux-kernel&m=117863520707703&w=2
http://rhn.redhat.com/errata/RHSA-2008-0508.html Patch
http://secunia.com/advisories/30850 Vendor Advisory
http://secunia.com/advisories/31107 Vendor Advisory
http://securityreason.com/securityalert/3965
http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap
http://www.openwall.com/lists/oss-security/2008/06/26/1 Patch
http://www.openwall.com/lists/oss-security/2008/07/14/1
http://www.securityfocus.com/bid/29945
http://www.securitytracker.com/id?1020362
http://www.ubuntu.com/usn/usn-625-1
https://bugzilla.redhat.com/show_bug.cgi?id=449359
https://exchange.xforce.ibmcloud.com/vulnerabilities/43567
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.23_rc1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24_rc4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.24_rc5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:46

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=5ecfbae093f0c37311e89b29bfc0c9d586eace87 - () http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=5ecfbae093f0c37311e89b29bfc0c9d586eace87 -
References () http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f358166a9405e4f1d8e50d8f415c26d95505b6de - () http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f358166a9405e4f1d8e50d8f415c26d95505b6de -
References () http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f5b40e363ad6041a96e3da32281d8faa191597b9 - () http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f5b40e363ad6041a96e3da32281d8faa191597b9 -
References () http://marc.info/?l=linux-kernel&m=117863520707703&w=2 - () http://marc.info/?l=linux-kernel&m=117863520707703&w=2 -
References () http://rhn.redhat.com/errata/RHSA-2008-0508.html - Patch () http://rhn.redhat.com/errata/RHSA-2008-0508.html - Patch
References () http://secunia.com/advisories/30850 - Vendor Advisory () http://secunia.com/advisories/30850 - Vendor Advisory
References () http://secunia.com/advisories/31107 - Vendor Advisory () http://secunia.com/advisories/31107 - Vendor Advisory
References () http://securityreason.com/securityalert/3965 - () http://securityreason.com/securityalert/3965 -
References () http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap - () http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap -
References () http://www.openwall.com/lists/oss-security/2008/06/26/1 - Patch () http://www.openwall.com/lists/oss-security/2008/06/26/1 - Patch
References () http://www.openwall.com/lists/oss-security/2008/07/14/1 - () http://www.openwall.com/lists/oss-security/2008/07/14/1 -
References () http://www.securityfocus.com/bid/29945 - () http://www.securityfocus.com/bid/29945 -
References () http://www.securitytracker.com/id?1020362 - () http://www.securitytracker.com/id?1020362 -
References () http://www.ubuntu.com/usn/usn-625-1 - () http://www.ubuntu.com/usn/usn-625-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=449359 - () https://bugzilla.redhat.com/show_bug.cgi?id=449359 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/43567 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/43567 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749 -

07 Nov 2023, 02:02

Type Values Removed Values Added
Summary Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user's process that trigger a conflict between utrace_detach and report_quiescent, related to "late ptrace_may_attach() check" and "race around &dead_engine_ops setting," a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x. Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user's process that trigger a conflict between utrace_detach and report_quiescent, related to "late ptrace_may_attach() check" and "race around &dead_engine_ops setting," a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.

Information

Published : 2008-06-30 21:41

Updated : 2024-11-21 00:46


NVD link : CVE-2008-2365

Mitre link : CVE-2008-2365

CVE.ORG link : CVE-2008-2365


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • enterprise_linux_desktop

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')