First published: Wed Dec 22 2004(Updated: )
Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | =2.6.5 | |
Linux kernel | =2.6.1 | |
Ubuntu Linux | =4.1 | |
Linux kernel | =2.6.0-test5 | |
Linux kernel | =2.6.3 | |
Linux kernel | =2.6.0-test2 | |
Linux kernel | =2.6.4 | |
Linux kernel | =2.6_test9_cvs | |
Linux kernel | =2.6.7-rc1 | |
Linux kernel | =2.6.2 | |
Linux kernel | =2.6.8-rc1 | |
Linux kernel | =2.6.0-test11 | |
Linux kernel | =2.6.1-rc2 | |
Linux kernel | =2.6.8 | |
Linux kernel | =2.6.0-test1 | |
Linux kernel | =2.6.0-test6 | |
Linux kernel | =2.6.10-rc2 | |
Linux kernel | =2.6.0-test4 | |
Linux kernel | =2.6.0 | |
Linux kernel | =2.6.0-test10 | |
Linux kernel | =2.6.0-test9 | |
Linux kernel | =2.6.7 | |
Linux kernel | =2.6.1-rc1 | |
Linux kernel | =2.6.6-rc1 | |
Linux kernel | =2.6.9-2.6.20 | |
Linux kernel | =2.6.0-test7 | |
Ubuntu Linux | =4.1 | |
Linux kernel | =2.6.8-rc2 | |
Linux kernel | =2.6.8-rc3 | |
Linux kernel | =2.6.0-test8 | |
Linux kernel | =2.6.6 | |
Linux kernel | =2.6.0-test3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1058 is considered to have medium severity due to its potential for local user exploitation.
To fix CVE-2004-1058, you should upgrade your Linux kernel to a version later than 2.6.8 that addresses this race condition.
Local users on systems running specific versions of the Linux kernel 2.6 are affected by CVE-2004-1058.
CVE-2004-1058 affects systems running Linux kernel versions 2.6.0 up to and including 2.6.8.
CVE-2004-1058 exploits a race condition allowing local users to read environment variables of another process during its spawning.