The kernel in Red Hat Enterprise Linux 3, when running on SMP systems, allows local users to cause a denial of service (deadlock) by running the shmat function on an shm at the same time that shmctl is removing that shm (IPC_RMID), which prevents a spinlock from being unlocked.
The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.
Link | Tags |
---|---|
http://www.kb.cert.org/vuls/id/245984 | third party advisory us government resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9649 | vdb entry signature broken link |
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205618 | issue tracking exploit |
http://secunia.com/advisories/23064 | third party advisory broken link |
http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm | third party advisory |
http://secunia.com/advisories/22497 | third party advisory broken link |
http://www.redhat.com/support/errata/RHSA-2006-0710.html | vendor advisory broken link |