CVE-2009-1388

The ptrace_start function in kernel/ptrace.c in the Linux kernel 2.6.18 does not properly handle simultaneous execution of the do_coredump function, which allows local users to cause a denial of service (deadlock) via vectors involving the ptrace system call and a coredumping thread.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*

History

15 Feb 2024, 19:19

Type Values Removed Values Added
CVSS v2 : 4.9
v3 : unknown
v2 : 4.9
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
CWE CWE-362 CWE-667
References () http://marc.info/?l=oss-security&m=124654277229434&w=2 - Patch () http://marc.info/?l=oss-security&m=124654277229434&w=2 - Mailing List, Patch
References () http://osvdb.org/55679 - () http://osvdb.org/55679 - Broken Link
References () http://secunia.com/advisories/36131 - () http://secunia.com/advisories/36131 - Broken Link
References () http://secunia.com/advisories/37471 - () http://secunia.com/advisories/37471 - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2009-1193.html - () http://www.redhat.com/support/errata/RHSA-2009-1193.html - Broken Link
References () http://www.securityfocus.com/archive/1/507985/100/0/threaded - () http://www.securityfocus.com/archive/1/507985/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/35559 - () http://www.securityfocus.com/bid/35559 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vmware.com/security/advisories/VMSA-2009-0016.html - () http://www.vmware.com/security/advisories/VMSA-2009-0016.html - Third Party Advisory
References () http://www.vupen.com/english/advisories/2009/3316 - () http://www.vupen.com/english/advisories/2009/3316 - Broken Link
References () https://bugzilla.redhat.com/attachment.cgi?id=346615 - Patch () https://bugzilla.redhat.com/attachment.cgi?id=346615 - Mailing List, Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=504263 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=504263 - Issue Tracking, Patch
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8625 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8625 - Broken Link
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8680 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8680 - Broken Link

Information

Published : 2009-07-05 16:30

Updated : 2024-02-15 19:19


NVD link : CVE-2009-1388

Mitre link : CVE-2009-1388

CVE.ORG link : CVE-2009-1388


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking