4.7
CVSSv2

CVE-2008-2365

Published: 30/06/2008 Updated: 07/11/2023
CVSS v2 Base Score: 4.7 | Impact Score: 6.9 | Exploitability Score: 3.4
VMScore: 480
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 up to and including 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user's process that trigger a conflict between utrace_detach and report_quiescent, related to "late ptrace_may_attach() check" and "race around &dead_engine_ops setting," a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions prior to 2.6.16.x.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.11

linux linux kernel 2.6.20.9

linux linux kernel 2.6.23.4

linux linux kernel 2.6.22.15

linux linux kernel 2.6.17.12

linux linux kernel 2.6.21

linux linux kernel 2.6.16.9

linux linux kernel 2.6.12

linux linux kernel 2.6.12.12

linux linux kernel 2.6.19

linux linux kernel 2.6.14

linux linux kernel 2.6.15.3

linux linux kernel 2.6.20.13

linux linux kernel 2.6.22.4

linux linux kernel 2.6.16

linux linux kernel 2.6.13

linux linux kernel 2.6.17.2

linux linux kernel 2.6.13.3

linux linux kernel 2.6.11.8

linux linux kernel 2.6.24.2

linux linux kernel 2.6.23.7

linux linux kernel 2.6.17.8

linux linux kernel 2.6.14.4

linux linux kernel 2.6.25.5

linux linux kernel 2.6.17.14

linux linux kernel 2.6.10

linux linux kernel 2.6.22.12

linux linux kernel 2.6.14.3

linux linux kernel 2.6.24

linux linux kernel 2.6.18.3

linux linux kernel 2.6.11.6

linux linux kernel 2.6.11.11

linux linux kernel 2.6.16.13

linux linux kernel 2.6.21.6

linux linux kernel 2.6.22.1

linux linux kernel 2.6.17.3

linux linux kernel 2.6.24.1

linux linux kernel 2.6.20.5

linux linux kernel 2.6.22

linux linux kernel 2.6.15.1

linux linux kernel 2.6.11.5

linux linux kernel 2.6.19.1

linux linux kernel 2.6.18.4

linux linux kernel 2.6.16.1

linux linux kernel 2.6.18.1

linux linux kernel 2.6.23.1

linux linux kernel 2.6.14.5

linux linux kernel 2.6.13.2

linux linux kernel 2.6.17.5

linux linux kernel 2.6.21.1

linux linux kernel 2.6.25.3

linux linux kernel 2.6.17

linux linux kernel 2.6.19.2

linux linux kernel 2.6.21.4

linux linux kernel 2.6.16.11

linux linux kernel 2.6.15

linux linux kernel 2.6.17.10

linux linux kernel 2.6.15.11

linux linux kernel 2.6.24_rc4

linux linux kernel 2.6.14.1

linux linux kernel 2.6.16.23

linux linux kernel 2.6.12.5

linux linux kernel 2.6.20

linux linux kernel 2.6.23.10

linux linux kernel 2.6.22.7

linux linux kernel 2.6.12.1

linux linux kernel 2.6.17.1

linux linux kernel 2.6.20.8

linux linux kernel 2.6.20.15

linux linux kernel 2.6.13.4

linux linux kernel 2.6.23.9

linux linux kernel 2.6.22.6

linux linux kernel 2.6.23.3

linux linux kernel 2.6.22.3

linux linux kernel 2.6.12.2

linux linux kernel 2.6.23

linux linux kernel 2.6.20.11

linux linux kernel 2.6.20.3

linux linux kernel 2.6.22.13

linux linux kernel 2.6.15.2

linux linux kernel 2.6.22.17

linux linux kernel 2.6.23.14

linux linux kernel 2.6.17.11

linux linux kernel 2.6.12.4

linux linux kernel 2.6.22.11

linux linux kernel 2.6.12.3

linux linux kernel 2.6.23.2

linux linux kernel 2.6.25.1

linux linux kernel 2.6.25.4

linux linux kernel 2.6.21.7

linux linux kernel 2.6.21.2

linux linux kernel 2.6.15.4

linux linux kernel 2.6.23_rc1

linux linux kernel 2.6.20.2

linux linux kernel 2.6.16.12

linux linux kernel 2.6.16.27

linux linux kernel 2.6.12.6

linux linux kernel 2.6.17.7

linux linux kernel 2.6.20.1

linux linux kernel 2.6.11.7

linux linux kernel 2.6.24.6

linux linux kernel 2.6.12.22

linux linux kernel 2.6.24_rc5

redhat enterprise linux desktop 4.0

linux linux kernel 2.6.23.5

linux linux kernel 2.6.22.8

linux linux kernel 2.6.14.2

linux linux kernel 2.6.18

linux linux kernel 2.6.20.4

linux linux kernel 2.6.17.6

linux linux kernel 2.6.23.6

linux linux kernel 2.6.16.7

linux linux kernel 2.6.17.13

redhat enterprise linux 4.0

linux linux kernel 2.6.25

linux linux kernel 2.6.25.2

linux linux kernel 2.6.22.5

linux linux kernel 2.6.11.4

linux linux kernel 2.6.16.19

linux linux kernel 2.6.11.12

linux linux kernel 2.6.22.16

linux linux kernel 2.6.9

linux linux kernel 2.6.13.1

linux linux kernel 2.6.22.14

Vendor Advisories

Dirk Nehring discovered that the IPsec protocol stack did not correctly handle fragmented ESP packets A remote attacker could exploit this to crash the system, leading to a denial of service (CVE-2007-6282) ...

Exploits

/* source: wwwsecurityfocuscom/bid/29945/info The Linux kernel is prone to a local denial-of-service vulnerability caused by a race condition Attackers can exploit this issue to cause the kernel to become unresponsive, denying service to legitimate users */ /* This software is provided 'as-is', without any express or implied war ...
/* source: wwwsecurityfocuscom/bid/29945/info The Linux kernel is prone to a local denial-of-service vulnerability caused by a race condition Attackers can exploit this issue to cause the kernel to become unresponsive, denying service to legitimate users */ #include <stdlibh> #include <sys/ptraceh> int main(int argc, ...