First published: Fri Dec 31 2004(Updated: )
The exit_thread function (process.c) in Linux kernel 2.6 through 2.6.5 does not invalidate the per-TSS io_bitmap pointers if a process obtains IO access permissions from the ioperm function but does not drop those permissions when it exits, which allows other processes to access the per-TSS pointers, access restricted memory locations, and possibly gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.0 | |
Linux Kernel | =2.6.1 | |
Linux Kernel | =2.6.1-rc1 | |
Linux Kernel | =2.6.1-rc2 | |
Linux Kernel | =2.6.2 | |
Linux Kernel | =2.6.3 | |
Linux Kernel | =2.6.4 | |
Linux Kernel | =2.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2536 is considered a high-severity vulnerability due to the potential for unauthorized IO access by other processes.
To fix CVE-2004-2536, upgrade the Linux kernel to version 2.6.6 or later, which addresses this vulnerability.
CVE-2004-2536 affects Linux kernel versions from 2.6.0 to 2.6.5.
Not addressing CVE-2004-2536 may allow malicious processes to access hardware IO resources, potentially leading to system compromise.
In CVE-2004-2536, the vulnerability lies in the exit_thread function within the process management code of the Linux kernel.