Vulnerability Description
Race condition in Linux 2.6, when threads are sharing memory mapping via CLONE_VM (such as linuxthreads and vfork), might allow local users to cause a denial of service (deadlock) by triggering a core dump while waiting for a thread that has just performed an exec.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 2.6.0 |
| Debian | Debian Linux | 3.1 |
| Canonical | Ubuntu Linux | 4.10 |
Related Weaknesses (CWE)
References
- http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.156?nav=index.html%7CBroken Link
- http://secunia.com/advisories/17141Broken Link
- http://secunia.com/advisories/18056Broken Link
- http://secunia.com/advisories/18510Broken Link
- http://www.debian.org/security/2005/dsa-922Mailing List
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:072PatchThird Party Advisory
- http://www.redhat.com/support/errata/RHSA-2006-0101.htmlBroken Link
- http://www.securityfocus.com/archive/1/427980/100/0/threadedBroken LinkThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/15049Broken LinkThird Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/usn-199-1Third Party Advisory
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Broken Link
- http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.156?nav=index.html%7CBroken Link
- http://secunia.com/advisories/17141Broken Link
- http://secunia.com/advisories/18056Broken Link
- http://secunia.com/advisories/18510Broken Link
FAQ
What is CVE-2005-3106?
CVE-2005-3106 is a vulnerability with a CVSS score of 4.7 (MEDIUM). Race condition in Linux 2.6, when threads are sharing memory mapping via CLONE_VM (such as linuxthreads and vfork), might allow local users to cause a denial of service (deadlock) by triggering a core...
How severe is CVE-2005-3106?
CVE-2005-3106 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3106?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux, Canonical Ubuntu Linux.