Vulnerabilities > CVE-2008-3077 - Use After Free vulnerability in Linux Kernel
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
arch/x86/kernel/ptrace.c in the Linux kernel before 2.6.25.10 on the x86_64 platform leaks task_struct references into the sys32_ptrace function, which allows local users to cause a denial of service (system crash) or have unspecified other impact via unknown vectors, possibly a use-after-free vulnerability.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Seebug
bulletinFamily | exploit |
description | CVE(CAN) ID: CVE-2008-3077 Linux Kernel是开放源码操作系统Linux所使用的内核。 Linux kernel的arch/x86/kernel/ptrace.c文件中的sys32_ptrace()函数可能会溢出task_struct结构的refcount字段,本地攻击者可以在x86-64平台上利用这个漏洞触发释放后使用,导致系统崩溃。 Linux kernel < 2.6.25.10 Linux ----- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a> |
id | SSV:3608 |
last seen | 2017-11-19 |
modified | 2008-07-14 |
published | 2008-07-14 |
reporter | Root |
title | Linux Kernel sys32_ptrace()函数多个释放后使用漏洞 |
Statements
contributor | Mark J Cox |
lastmodified | 2008-07-09 |
organization | Red Hat |
statement | Not vulnerable. This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5. |
References
- http://www.openwall.com/lists/oss-security/2008/07/03/2
- http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.10
- http://secunia.com/advisories/31048
- http://www.securityfocus.com/bid/30077
- http://www.vupen.com/english/advisories/2008/2063/references
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commitdiff%3Bh=1e9a615bfce7996ea4d815d45d364b47ac6a74e8