Linux kernel task /proc race condition denial of service

linux-task-race-condition-dos (26746) The risk level is classified as MediumMedium Risk

Description:

A race condition in the Linux kernel on SMP systems could allow a local attacker to cause a denial of service. If an attacker creates and exits a large number of tasks and then accesses the /proc entry for one of the tasks that is exiting, the attacker could cause a memory corruption error in the prune_dcache() function to cause the kernel to crash.


Consequences:

Denial of Service

Remedy:

No remedy available as of July 1, 2014.

References:

  • linux-kernel Mailing List, 2006-05-26 0:43:33: PROBLEM: /proc (procfs) task exit race condition causes a kernel.
  • The Linux Kernel Archives Web site: The Linux Kernel Archives.
  • BID-18183: Linux Kernel Proc dentry_unused Corruption Local Denial of Service Vulnerability
  • CVE-2006-2629: Race condition in Linux kernel 2.6.15 to 2.6.17, when running on SMP platforms, allows local users to cause a denial of service (crash) by creating and exiting a large number of tasks, then accessing the /proc entry of a task that is exiting, which causes memory corruption that leads to a failure in the prune_dcache function or a BUG_ON error in include/linux/list.h.
  • OSVDB ID: 25847: Linux Kernel SMP /proc Race Condition Local DoS
  • SA20349: Linux Kernel SMP "/proc" Race Condition Denial of Service
  • VUPEN/ADV-2006-2070: Linux Kernel prune_dcache() Race Condition Denial of Service Vulnerability

Platforms Affected:

  • Linux Kernel 2.6.17 rc2
  • Linux Kernel 2.6.17 rc1
  • Linux Kernel 2.6.17 rc3
  • Linux Kernel 2.6.17 rc4
  • Linux Kernel 2.6.17 rc5
  • Linux Linux Kernel 2.6.15
  • Linux Linux Kernel 2.6.15.1
  • Linux Linux Kernel 2.6.15.2
  • Linux Linux Kernel 2.6.15.3
  • Linux Linux Kernel 2.6.15.4
  • Linux Linux Kernel 2.6.15.5
  • Linux Linux Kernel 2.6.15.6
  • Linux Linux Kernel 2.6.16 rc2
  • Linux Linux Kernel 2.6.16 rc1
  • Linux Linux Kernel 2.6.16 rc3
  • Linux Linux Kernel 2.6.16 rc5
  • Linux Linux Kernel 2.6.16 rc6
  • Linux Linux Kernel 2.6.16
  • Linux Linux Kernel 2.6.16 rc4
  • Linux Linux Kernel 2.6.16.1
  • Linux Linux Kernel 2.6.16.10
  • Linux Linux Kernel 2.6.16.11
  • Linux Linux Kernel 2.6.16.12
  • Linux Linux Kernel 2.6.16.13
  • Linux Linux Kernel 2.6.16.14
  • Linux Linux Kernel 2.6.16.15
  • Linux Linux Kernel 2.6.16.16
  • Linux Linux Kernel 2.6.16.17
  • Linux Linux Kernel 2.6.16.18
  • Linux Linux Kernel 2.6.16.2
  • Linux Linux Kernel 2.6.16.3
  • Linux Linux Kernel 2.6.16.4
  • Linux Linux Kernel 2.6.16.5
  • Linux Linux Kernel 2.6.16.6
  • Linux Linux Kernel 2.6.16.7
  • Linux Linux Kernel 2.6.16.8
  • Linux Linux Kernel 2.6.16.9
  • Linux Linux Kernel 2.6.17

Reported:

May 26, 2006

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page