CVE-2008-2365
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
30/06/2008
Last modified:
09/04/2025
Description
Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user's process that trigger a conflict between utrace_detach and report_quiescent, related to "late ptrace_may_attach() check" and "race around &dead_engine_ops setting," a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.
Impact
Base Score 2.0
4.70
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba%3Dcommit%3Bh%3D5ecfbae093f0c37311e89b29bfc0c9d586eace87
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba%3Dcommit%3Bh%3Df358166a9405e4f1d8e50d8f415c26d95505b6de
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba%3Dcommit%3Bh%3Df5b40e363ad6041a96e3da32281d8faa191597b9
- http://marc.info/?l=linux-kernel&m=117863520707703&w=2
- http://rhn.redhat.com/errata/RHSA-2008-0508.html
- http://secunia.com/advisories/30850
- http://secunia.com/advisories/31107
- http://securityreason.com/securityalert/3965
- http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap
- http://www.openwall.com/lists/oss-security/2008/06/26/1
- http://www.openwall.com/lists/oss-security/2008/07/14/1
- http://www.securityfocus.com/bid/29945
- http://www.securitytracker.com/id?1020362=
- http://www.ubuntu.com/usn/usn-625-1
- https://bugzilla.redhat.com/show_bug.cgi?id=449359
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43567
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba%3Dcommit%3Bh%3D5ecfbae093f0c37311e89b29bfc0c9d586eace87
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba%3Dcommit%3Bh%3Df358166a9405e4f1d8e50d8f415c26d95505b6de
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba%3Dcommit%3Bh%3Df5b40e363ad6041a96e3da32281d8faa191597b9
- http://marc.info/?l=linux-kernel&m=117863520707703&w=2
- http://rhn.redhat.com/errata/RHSA-2008-0508.html
- http://secunia.com/advisories/30850
- http://secunia.com/advisories/31107
- http://securityreason.com/securityalert/3965
- http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap
- http://www.openwall.com/lists/oss-security/2008/06/26/1
- http://www.openwall.com/lists/oss-security/2008/07/14/1
- http://www.securityfocus.com/bid/29945
- http://www.securitytracker.com/id?1020362=
- http://www.ubuntu.com/usn/usn-625-1
- https://bugzilla.redhat.com/show_bug.cgi?id=449359
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43567
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749



