The handle_stop_signal function in signal.c in Linux kernel 2.6.11 up to other versions before 2.6.13 and 2.6.12.6 allows local users to cause a denial of service (deadlock) by sending a SIGKILL to a real-time threaded process while it is performing a core dump.
References
Configurations
History
21 Nov 2024, 00:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html - Broken Link | |
References | () http://marc.info/?l=linux-kernel&m=112430346613450&w=2 - Mailing List, Patch | |
References | () http://marc.info/?l=linux-kernel&m=112508422716574&w=2 - Mailing List, Patch | |
References | () http://secunia.com/advisories/19038 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/19374 - Broken Link, Vendor Advisory | |
References | () http://www.debian.org/security/2006/dsa-1017 - Patch, Vendor Advisory | |
References | () http://www.kernel.org/git/?p=linux/kernel/git/chrisw/stable-queue.git%3Ba=blob%3Bh=f6cc7e101c49f356e4c4df5cca1ff352a0f01dd5%3Bhb=9c5fcb99af7c157be45e9d53aeb857ded5211fcd%3Bf=2.6.12.6/nptl-signal-delivery-deadlock-fix.patch - Broken Link | |
References | () http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=dd12f48d4e8774415b528d3991ae47c28f26e1ac%3Bhp=ade6648b3b11a5d81f6f28135193ab6d85d621db - Broken Link | |
References | () http://www.securityfocus.com/bid/16856 - Broken Link, Third Party Advisory, VDB Entry |
15 Feb 2024, 20:22
Type | Values Removed | Values Added |
---|---|---|
References | (BID) http://www.securityfocus.com/bid/16856 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MLIST) http://marc.info/?l=linux-kernel&m=112430346613450&w=2 - Mailing List, Patch | |
References | () http://www.kernel.org/git/?p=linux/kernel/git/chrisw/stable-queue.git%3Ba=blob%3Bh=f6cc7e101c49f356e4c4df5cca1ff352a0f01dd5%3Bhb=9c5fcb99af7c157be45e9d53aeb857ded5211fcd%3Bf=2.6.12.6/nptl-signal-delivery-deadlock-fix.patch - Broken Link | |
References | (MLIST) http://marc.info/?l=linux-kernel&m=112508422716574&w=2 - Mailing List, Patch | |
References | (SECUNIA) http://secunia.com/advisories/19038 - Broken Link, Vendor Advisory | |
References | () http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=dd12f48d4e8774415b528d3991ae47c28f26e1ac%3Bhp=ade6648b3b11a5d81f6f28135193ab6d85d621db - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/19374 - Broken Link, Vendor Advisory | |
References | (SUSE) http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html - Broken Link | |
CPE | cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 5.5 |
First Time |
Debian
Debian debian Linux |
|
CWE | CWE-667 |
07 Nov 2023, 01:57
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2005-11-27 00:03
Updated : 2024-11-21 00:02
NVD link : CVE-2005-3847
Mitre link : CVE-2005-3847
CVE.ORG link : CVE-2005-3847
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-667
Improper Locking