The handle_stop_signal function in signal.c in Linux kernel 2.6.11 up to other versions before 2.6.13 and 2.6.12.6 allows local users to cause a denial of service (deadlock) by sending a SIGKILL to a real-time threaded process while it is performing a core dump.
The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.
Link | Tags |
---|---|
http://secunia.com/advisories/19038 | vendor advisory broken link third party advisory |
http://www.kernel.org/git/?p=linux/kernel/git/chrisw/stable-queue.git%3Ba=blob%3Bh=f6cc7e101c49f356e4c4df5cca1ff352a0f01dd5%3Bhb=9c5fcb99af7c157be45e9d53aeb857ded5211fcd%3Bf=2.6.12.6/nptl-signal-delivery-deadlock-fix.patch | broken link |
http://marc.info/?l=linux-kernel&m=112508422716574&w=2 | patch mailing list |
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=dd12f48d4e8774415b528d3991ae47c28f26e1ac%3Bhp=ade6648b3b11a5d81f6f28135193ab6d85d621db | broken link |
http://www.securityfocus.com/bid/16856 | broken link third party advisory vdb entry |
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html | vendor advisory broken link |
http://www.debian.org/security/2006/dsa-1017 | patch vendor advisory |
http://secunia.com/advisories/19374 | vendor advisory broken link third party advisory |
http://marc.info/?l=linux-kernel&m=112430346613450&w=2 | patch mailing list |