Race condition vulnerability in SELinux 2.6.x through 2.6.9 allows local users to cause kernel crash via SOCK_SEQPACKET unix domain sockets

Race condition vulnerability in SELinux 2.6.x through 2.6.9 allows local users to cause kernel crash via SOCK_SEQPACKET unix domain sockets

CVE-2004-1069 · LOW Severity

AV:L/AC:H/AU:N/C:N/I:N/A:P

Race condition in SELinux 2.6.x through 2.6.9 allows local users to cause a denial of service (kernel crash) via SOCK_SEQPACKET unix domain sockets, which are not properly handled in the sock_dgram_sendmsg function.

Learn more about our Cis Benchmark Audit For Distribution Independent Linux.