The kernel in Red Hat Enterprise Linux 3, when running on SMP systems, allows local users to cause a denial of service (deadlock) by running the shmat function on an shm at the same time that shmctl is removing that shm (IPC_RMID), which prevents a spinlock from being unlocked.
References
Link | Resource |
---|---|
http://secunia.com/advisories/22497 | Broken Link |
http://secunia.com/advisories/23064 | Broken Link |
http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm | Third Party Advisory |
http://www.kb.cert.org/vuls/id/245984 | Third Party Advisory US Government Resource |
http://www.redhat.com/support/errata/RHSA-2006-0710.html | Broken Link |
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205618 | Exploit Issue Tracking |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9649 | Broken Link |
Configurations
History
No history.
Information
Published : 2006-10-17 17:07
Updated : 2024-02-15 20:17
NVD link : CVE-2006-4342
Mitre link : CVE-2006-4342
CVE.ORG link : CVE-2006-4342
JSON object : View
Products Affected
redhat
- enterprise_linux
CWE
CWE-667
Improper Locking