Lucene search

K
nvd[email protected]NVD:CVE-2008-2365
HistoryJun 30, 2008 - 9:41 p.m.

CVE-2008-2365

2008-06-3021:41:00
CWE-362
web.nvd.nist.gov

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

4.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.1%

Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user’s process that trigger a conflict between utrace_detach and report_quiescent, related to β€œlate ptrace_may_attach() check” and β€œrace around &dead_engine_ops setting,” a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.

Affected configurations

NVD
Node
linuxlinux_kernelMatch2.6.9
OR
linuxlinux_kernelMatch2.6.10
OR
linuxlinux_kernelMatch2.6.10rc2
OR
linuxlinux_kernelMatch2.6.11
OR
linuxlinux_kernelMatch2.6.11rc2
OR
linuxlinux_kernelMatch2.6.11rc3
OR
linuxlinux_kernelMatch2.6.11rc4
OR
linuxlinux_kernelMatch2.6.11.4
OR
linuxlinux_kernelMatch2.6.11.5
OR
linuxlinux_kernelMatch2.6.11.6
OR
linuxlinux_kernelMatch2.6.11.7
OR
linuxlinux_kernelMatch2.6.11.8
OR
linuxlinux_kernelMatch2.6.11.11
OR
linuxlinux_kernelMatch2.6.11.12
OR
linuxlinux_kernelMatch2.6.12
OR
linuxlinux_kernelMatch2.6.12rc1
OR
linuxlinux_kernelMatch2.6.12rc4
OR
linuxlinux_kernelMatch2.6.12rc5
OR
linuxlinux_kernelMatch2.6.12.1
OR
linuxlinux_kernelMatch2.6.12.2
OR
linuxlinux_kernelMatch2.6.12.3
OR
linuxlinux_kernelMatch2.6.12.4
OR
linuxlinux_kernelMatch2.6.12.5
OR
linuxlinux_kernelMatch2.6.12.6
OR
linuxlinux_kernelMatch2.6.12.12
OR
linuxlinux_kernelMatch2.6.12.22
OR
linuxlinux_kernelMatch2.6.13
OR
linuxlinux_kernelMatch2.6.13rc1
OR
linuxlinux_kernelMatch2.6.13rc4
OR
linuxlinux_kernelMatch2.6.13rc6
OR
linuxlinux_kernelMatch2.6.13rc7
OR
linuxlinux_kernelMatch2.6.13.1
OR
linuxlinux_kernelMatch2.6.13.2
OR
linuxlinux_kernelMatch2.6.13.3
OR
linuxlinux_kernelMatch2.6.13.4
OR
linuxlinux_kernelMatch2.6.14
OR
linuxlinux_kernelMatch2.6.14rc1
OR
linuxlinux_kernelMatch2.6.14rc2
OR
linuxlinux_kernelMatch2.6.14rc3
OR
linuxlinux_kernelMatch2.6.14rc4
OR
linuxlinux_kernelMatch2.6.14.1
OR
linuxlinux_kernelMatch2.6.14.2
OR
linuxlinux_kernelMatch2.6.14.3
OR
linuxlinux_kernelMatch2.6.14.4
OR
linuxlinux_kernelMatch2.6.14.5
OR
linuxlinux_kernelMatch2.6.15
OR
linuxlinux_kernelMatch2.6.15rc1
OR
linuxlinux_kernelMatch2.6.15rc2
OR
linuxlinux_kernelMatch2.6.15rc3
OR
linuxlinux_kernelMatch2.6.15.1
OR
linuxlinux_kernelMatch2.6.15.2
OR
linuxlinux_kernelMatch2.6.15.3
OR
linuxlinux_kernelMatch2.6.15.4
OR
linuxlinux_kernelMatch2.6.15.11
OR
linuxlinux_kernelMatch2.6.16
OR
linuxlinux_kernelMatch2.6.16rc1
OR
linuxlinux_kernelMatch2.6.16.1
OR
linuxlinux_kernelMatch2.6.16.7
OR
linuxlinux_kernelMatch2.6.16.9
OR
linuxlinux_kernelMatch2.6.16.11
OR
linuxlinux_kernelMatch2.6.16.12
OR
linuxlinux_kernelMatch2.6.16.13
OR
linuxlinux_kernelMatch2.6.16.19
OR
linuxlinux_kernelMatch2.6.16.23
OR
linuxlinux_kernelMatch2.6.16.27
OR
linuxlinux_kernelMatch2.6.17
OR
linuxlinux_kernelMatch2.6.17rc5
OR
linuxlinux_kernelMatch2.6.17.1
OR
linuxlinux_kernelMatch2.6.17.2
OR
linuxlinux_kernelMatch2.6.17.3
OR
linuxlinux_kernelMatch2.6.17.5
OR
linuxlinux_kernelMatch2.6.17.6
OR
linuxlinux_kernelMatch2.6.17.7
OR
linuxlinux_kernelMatch2.6.17.8
OR
linuxlinux_kernelMatch2.6.17.10
OR
linuxlinux_kernelMatch2.6.17.11
OR
linuxlinux_kernelMatch2.6.17.12
OR
linuxlinux_kernelMatch2.6.17.13
OR
linuxlinux_kernelMatch2.6.17.14
OR
linuxlinux_kernelMatch2.6.18
OR
linuxlinux_kernelMatch2.6.18.1
OR
linuxlinux_kernelMatch2.6.18.3
OR
linuxlinux_kernelMatch2.6.18.4
OR
linuxlinux_kernelMatch2.6.19
OR
linuxlinux_kernelMatch2.6.19rc1
OR
linuxlinux_kernelMatch2.6.19rc2
OR
linuxlinux_kernelMatch2.6.19rc3
OR
linuxlinux_kernelMatch2.6.19rc4
OR
linuxlinux_kernelMatch2.6.19.1
OR
linuxlinux_kernelMatch2.6.19.2
OR
linuxlinux_kernelMatch2.6.20
OR
linuxlinux_kernelMatch2.6.20.1
OR
linuxlinux_kernelMatch2.6.20.2
OR
linuxlinux_kernelMatch2.6.20.3
OR
linuxlinux_kernelMatch2.6.20.4
OR
linuxlinux_kernelMatch2.6.20.5
OR
linuxlinux_kernelMatch2.6.20.8
OR
linuxlinux_kernelMatch2.6.20.9
OR
linuxlinux_kernelMatch2.6.20.11
OR
linuxlinux_kernelMatch2.6.20.13
OR
linuxlinux_kernelMatch2.6.20.15
OR
linuxlinux_kernelMatch2.6.21
OR
linuxlinux_kernelMatch2.6.21rc3
OR
linuxlinux_kernelMatch2.6.21rc4
OR
linuxlinux_kernelMatch2.6.21rc5
OR
linuxlinux_kernelMatch2.6.21rc6
OR
linuxlinux_kernelMatch2.6.21.1
OR
linuxlinux_kernelMatch2.6.21.2
OR
linuxlinux_kernelMatch2.6.21.4
OR
linuxlinux_kernelMatch2.6.21.6
OR
linuxlinux_kernelMatch2.6.21.7
OR
linuxlinux_kernelMatch2.6.22
OR
linuxlinux_kernelMatch2.6.22.1
OR
linuxlinux_kernelMatch2.6.22.3
OR
linuxlinux_kernelMatch2.6.22.4
OR
linuxlinux_kernelMatch2.6.22.5
OR
linuxlinux_kernelMatch2.6.22.6
OR
linuxlinux_kernelMatch2.6.22.7
OR
linuxlinux_kernelMatch2.6.22.8
OR
linuxlinux_kernelMatch2.6.22.11
OR
linuxlinux_kernelMatch2.6.22.12
OR
linuxlinux_kernelMatch2.6.22.13
OR
linuxlinux_kernelMatch2.6.22.14
OR
linuxlinux_kernelMatch2.6.22.15
OR
linuxlinux_kernelMatch2.6.22.16
OR
linuxlinux_kernelMatch2.6.22.17
OR
linuxlinux_kernelMatch2.6.23
OR
linuxlinux_kernelMatch2.6.23rc1
OR
linuxlinux_kernelMatch2.6.23.1
OR
linuxlinux_kernelMatch2.6.23.2
OR
linuxlinux_kernelMatch2.6.23.3
OR
linuxlinux_kernelMatch2.6.23.4
OR
linuxlinux_kernelMatch2.6.23.5
OR
linuxlinux_kernelMatch2.6.23.6
OR
linuxlinux_kernelMatch2.6.23.7
OR
linuxlinux_kernelMatch2.6.23.9
OR
linuxlinux_kernelMatch2.6.23.10
OR
linuxlinux_kernelMatch2.6.23.14
OR
linuxlinux_kernelMatch2.6.23_rc1
OR
linuxlinux_kernelMatch2.6.24
OR
linuxlinux_kernelMatch2.6.24rc2
OR
linuxlinux_kernelMatch2.6.24rc3
OR
linuxlinux_kernelMatch2.6.24.1
OR
linuxlinux_kernelMatch2.6.24.2
OR
linuxlinux_kernelMatch2.6.24.6
OR
linuxlinux_kernelMatch2.6.24_rc4
OR
linuxlinux_kernelMatch2.6.24_rc5
OR
linuxlinux_kernelMatch2.6.25
OR
linuxlinux_kernelMatch2.6.25.1
OR
linuxlinux_kernelMatch2.6.25.2
OR
linuxlinux_kernelMatch2.6.25.3
OR
linuxlinux_kernelMatch2.6.25.4
OR
linuxlinux_kernelMatch2.6.25.5
OR
redhatenterprise_linuxMatch4.0as
OR
redhatenterprise_linuxMatch4.0es
OR
redhatenterprise_linuxMatch4.0ws
OR
redhatenterprise_linux_desktopMatch4.0

References

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

4.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.1%