Vulnerabilities > CVE-2007-0771 - Local Denial of Service vulnerability in Linux Kernel UTrace

047910
CVSS 4.9 - MEDIUM
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
COMPLETE
local
low complexity
linux
redhat
nessus

Summary

The utrace support in Linux kernel 2.6.18, and other versions, allows local users to cause a denial of service (system hang) related to "MT exec + utrace_attach spin failure mode," as demonstrated by ptrace-thrash.c.

Nessus

  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2007-0169.NASL
    descriptionUpdated kernel packages that fix security issues and bugs in the Red Hat Enterprise Linux 5 kernel are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. The Linux kernel handles the basic functions of the operating system. These new kernel packages contain fixes for the following security issues : * a flaw in the IPv6 socket option handling that allowed a local user to read arbitrary kernel memory (CVE-2007-1000, Important). * a flaw in the IPv6 socket option handling that allowed a local user to cause a denial of service (CVE-2007-1388, Important). * a flaw in the utrace support that allowed a local user to cause a denial of service (CVE-2007-0771, Important). In addition to the security issues described above, a fix for a memory leak in the audit subsystem and a fix for a data corruption bug on s390 systems have been included. Red Hat Enterprise Linux 5 users are advised to upgrade to these erratum packages, which are not vulnerable to these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id25126
    published2007-05-02
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/25126
    titleCentOS 5 : Kernel (CESA-2007:0169)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2007-0169.NASL
    descriptionUpdated kernel packages that fix security issues and bugs in the Red Hat Enterprise Linux 5 kernel are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. The Linux kernel handles the basic functions of the operating system. These new kernel packages contain fixes for the following security issues : * a flaw in the IPv6 socket option handling that allowed a local user to read arbitrary kernel memory (CVE-2007-1000, Important). * a flaw in the IPv6 socket option handling that allowed a local user to cause a denial of service (CVE-2007-1388, Important). * a flaw in the utrace support that allowed a local user to cause a denial of service (CVE-2007-0771, Important). In addition to the security issues described above, a fix for a memory leak in the audit subsystem and a fix for a data corruption bug on s390 systems have been included. Red Hat Enterprise Linux 5 users are advised to upgrade to these erratum packages, which are not vulnerable to these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id25328
    published2007-05-25
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/25328
    titleRHEL 5 : kernel (RHSA-2007:0169)

Oval

accepted2013-04-29T04:19:28.152-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 5
    ovaloval:org.mitre.oval:def:11414
  • commentThe operating system installed on the system is CentOS Linux 5.x
    ovaloval:org.mitre.oval:def:15802
  • commentOracle Linux 5.x
    ovaloval:org.mitre.oval:def:15459
descriptionThe utrace support in Linux kernel 2.6.18, and other versions, allows local users to cause a denial of service (system hang) related to "MT exec + utrace_attach spin failure mode," as demonstrated by ptrace-thrash.c.
familyunix
idoval:org.mitre.oval:def:9447
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleThe utrace support in Linux kernel 2.6.18, and other versions, allows local users to cause a denial of service (system hang) related to "MT exec + utrace_attach spin failure mode," as demonstrated by ptrace-thrash.c.
version18

Redhat

advisories
rhsa
idRHSA-2007:0169
rpms
  • kernel-0:2.6.18-8.1.3.el5
  • kernel-PAE-0:2.6.18-8.1.3.el5
  • kernel-PAE-debuginfo-0:2.6.18-8.1.3.el5
  • kernel-PAE-devel-0:2.6.18-8.1.3.el5
  • kernel-debuginfo-0:2.6.18-8.1.3.el5
  • kernel-debuginfo-common-0:2.6.18-8.1.3.el5
  • kernel-devel-0:2.6.18-8.1.3.el5
  • kernel-doc-0:2.6.18-8.1.3.el5
  • kernel-headers-0:2.6.18-8.1.3.el5
  • kernel-kdump-0:2.6.18-8.1.3.el5
  • kernel-kdump-debuginfo-0:2.6.18-8.1.3.el5
  • kernel-kdump-devel-0:2.6.18-8.1.3.el5
  • kernel-xen-0:2.6.18-8.1.3.el5
  • kernel-xen-debuginfo-0:2.6.18-8.1.3.el5
  • kernel-xen-devel-0:2.6.18-8.1.3.el5