Description
Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores.
Product(s):
- Netkit Linux Netkit 0.17.17
- Netkit Linux Netkit 0.17
- VServer Linux-VServer 1.20
- VServer Linux-VServer 1.21
- VServer Linux-VServer 1.22
- VServer Linux-VServer 1.23
- VServer Linux-VServer 1.24
- Linux Kernel 2.0.10
- Linux Kernel 2.0.11
- Linux Kernel 2.0.12
- Linux Kernel 2.0.13
- Linux Kernel 2.0.14
- Linux Kernel 2.0.15
- Linux Kernel 2.0.16
- Linux Kernel 2.0.17
- Linux Kernel 2.0.18
- Linux Kernel 2.0.19
- Linux Kernel 2.0.1
- Linux Kernel 2.0.20
- Linux Kernel 2.0.21
- Linux Kernel 2.0.22
- Linux Kernel 2.0.23
- Linux Kernel 2.0.24
- Linux Kernel 2.0.25
- Linux Kernel 2.0.26
- Linux Kernel 2.0.27
- Linux Kernel 2.0.28
- Linux Kernel 2.0.29
- Linux Kernel 2.0.2
- Linux Kernel 2.0.30
- Linux Kernel 2.0.31
- Linux Kernel 2.0.32
- Linux Kernel 2.0.33
- Linux Kernel 2.0.34
- Linux Kernel 2.0.35
- Linux Kernel 2.0.36
- Linux Kernel 2.0.37
- Linux Kernel 2.0.38
- Linux Kernel 2.0.39
- Linux Kernel 2.0.3
- Linux Kernel 2.0.4
- Linux Kernel 2.0.5
- Linux Kernel 2.0.6
- Linux Kernel 2.0.7
- Linux Kernel 2.0.8
- Linux Kernel 2.0.9.9
- Linux Kernel 2.0.9
- Linux Kernel 2.0
- Linux Kernel 2.1.89
- Linux Kernel 2.1
- Linux Kernel 2.2
- Linux Kernel 2.2.10
- Linux Kernel 2.2.11
- Linux Kernel 2.2.12
- Linux Kernel 2.2.13
- Linux Kernel 2.2.13 pre15
- Linux Kernel 2.2.14
- Linux Kernel 2.2.15
- Linux Kernel 2.2.15 pre16
- Linux Linux Kernel 2.2.15_pre20
- Linux Kernel 2.2.16
- Linux Kernel 2.2.16 pre5
- Linux Kernel 2.2.16 pre6
- Linux Kernel 2.2.17
- Linux Kernel 2.2.17.14
- Linux Kernel 2.2.18
- Linux Kernel 2.2.19
- Linux Kernel 2.2.1
- Linux Kernel 2.2.20
- Linux Kernel 2.2.21
- Linux Kernel 2.2.21 pre1
- Linux Kernel 2.2.21 pre2
- Linux Kernel 2.2.21 pre3
- Linux Kernel 2.2.21 pre4
- Linux Kernel 2.2.21 rc1
- Linux Kernel 2.2.21 rc2
- Linux Kernel 2.2.21 rc3
- Linux Kernel 2.2.21 rc4
- Linux Kernel 2.2.22
- Linux Kernel 2.2.22 rc1
- Linux Kernel 2.2.22 rc2
- Linux Kernel 2.2.22 rc3
- Linux Kernel 2.2.23
- Linux Kernel 2.2.23 rc1
- Linux Kernel 2.2.23 rc2
- Linux Kernel 2.2.24
- Linux Kernel 2.2.24 rc2
- Linux Kernel 2.2.24 rc3
- Linux Kernel 2.2.24 rc4
- Linux Kernel 2.2.24 rc5
- Linux Kernel 2.2.25
- Linux Kernel 2.2.27 rc2
- +259 additional
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-0178, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-0178 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.