Red Hat Bugzilla – Bug 140710
CAN-2004-1068 Missing serialisation in unix_dgram_recvmsg
Last modified: 2007-11-30 17:07:05 EST
According to isec.pl on Nov19: "There is a subtle race condition finally permitting a non-root user to increment (up to 256 times) any arbitrary location(s) in kernel space. The condition is not easy to exploit since an attacker must trick kmalloc() to sleep on allocation of a special chunk of memory and then convince the scheduler to execute another thread. But it is feasible." http://linux.bkbits.net:8080/linux-2.4/cset@4199284dnTPrPLR-yhP_rOBHXJlltA Therefore fixed in 2.4.28 http://linux.bkbits.net:8080/linux-2.6/cset@419927f5Wy2IOKwcqE2S3DTNYSmCqQ Therefore will be fixed in 2.6.10 CVE name applied for
A fix for this problem has just been committed to the RHEL3 E4 patch pool this evening (in kernel version 2.4.21-20.0.1.EL). I'm leaving this in ASSIGNED state until the fix is also propagated to the RHEL3 U4 and U5 patch pools.
A fix for this problem has just been committed to the RHEL3 U4 patch pool this evening (in kernel version 2.4.21-27.EL). I'm leaving this in ASSIGNED state until the fix is also propagated to the RHEL3 U5 patch pool.
http://rhn.redhat.com/errata/RHSA-2004-549.html
A fix for this problem has just been committed to the RHEL3 U5 patch pool this evening (in kernel version 2.4.21-27.3.EL). Work on this problem has now been completed.