CVE-2009-0859

The shm_get_stat function in ipc/shm.c in the shm subsystem in the Linux kernel before 2.6.28.5, when CONFIG_SHMEM is disabled, misinterprets the data type of an inode, which allows local users to cause a denial of service (system hang) via an SHM_INFO shmctl call, as demonstrated by running the ipcs program.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a68e61e8ff2d46327a37b69056998b47745db6fa
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.5
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
http://marc.info/?l=git-commits-head&m=123387479500599&w=2
http://marc.info/?l=linux-kernel&m=120428209704324&w=2
http://marc.info/?l=linux-kernel&m=123309645625549&w=2
http://openwall.com/lists/oss-security/2009/03/06/1
http://patchwork.kernel.org/patch/6554/
http://secunia.com/advisories/34981
http://secunia.com/advisories/35011
http://secunia.com/advisories/35121
http://secunia.com/advisories/35185
http://secunia.com/advisories/35390
http://secunia.com/advisories/35394
http://www.debian.org/security/2009/dsa-1787
http://www.debian.org/security/2009/dsa-1794
http://www.debian.org/security/2009/dsa-1800
http://www.securityfocus.com/bid/34020
http://www.ubuntu.com/usn/usn-751-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/49229
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a68e61e8ff2d46327a37b69056998b47745db6fa
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.5
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
http://marc.info/?l=git-commits-head&m=123387479500599&w=2
http://marc.info/?l=linux-kernel&m=120428209704324&w=2
http://marc.info/?l=linux-kernel&m=123309645625549&w=2
http://openwall.com/lists/oss-security/2009/03/06/1
http://patchwork.kernel.org/patch/6554/
http://secunia.com/advisories/34981
http://secunia.com/advisories/35011
http://secunia.com/advisories/35121
http://secunia.com/advisories/35185
http://secunia.com/advisories/35390
http://secunia.com/advisories/35394
http://www.debian.org/security/2009/dsa-1787
http://www.debian.org/security/2009/dsa-1794
http://www.debian.org/security/2009/dsa-1800
http://www.securityfocus.com/bid/34020
http://www.ubuntu.com/usn/usn-751-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/49229
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:01

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a68e61e8ff2d46327a37b69056998b47745db6fa - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a68e61e8ff2d46327a37b69056998b47745db6fa -
References () http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.5 - () http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.5 -
References () http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html -
References () http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html -
References () http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html -
References () http://marc.info/?l=git-commits-head&m=123387479500599&w=2 - () http://marc.info/?l=git-commits-head&m=123387479500599&w=2 -
References () http://marc.info/?l=linux-kernel&m=120428209704324&w=2 - () http://marc.info/?l=linux-kernel&m=120428209704324&w=2 -
References () http://marc.info/?l=linux-kernel&m=123309645625549&w=2 - () http://marc.info/?l=linux-kernel&m=123309645625549&w=2 -
References () http://openwall.com/lists/oss-security/2009/03/06/1 - () http://openwall.com/lists/oss-security/2009/03/06/1 -
References () http://patchwork.kernel.org/patch/6554/ - () http://patchwork.kernel.org/patch/6554/ -
References () http://secunia.com/advisories/34981 - () http://secunia.com/advisories/34981 -
References () http://secunia.com/advisories/35011 - () http://secunia.com/advisories/35011 -
References () http://secunia.com/advisories/35121 - () http://secunia.com/advisories/35121 -
References () http://secunia.com/advisories/35185 - () http://secunia.com/advisories/35185 -
References () http://secunia.com/advisories/35390 - () http://secunia.com/advisories/35390 -
References () http://secunia.com/advisories/35394 - () http://secunia.com/advisories/35394 -
References () http://www.debian.org/security/2009/dsa-1787 - () http://www.debian.org/security/2009/dsa-1787 -
References () http://www.debian.org/security/2009/dsa-1794 - () http://www.debian.org/security/2009/dsa-1794 -
References () http://www.debian.org/security/2009/dsa-1800 - () http://www.debian.org/security/2009/dsa-1800 -
References () http://www.securityfocus.com/bid/34020 - () http://www.securityfocus.com/bid/34020 -
References () http://www.ubuntu.com/usn/usn-751-1 - () http://www.ubuntu.com/usn/usn-751-1 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/49229 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/49229 -

07 Nov 2023, 02:03

Type Values Removed Values Added
References
  • {'url': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a68e61e8ff2d46327a37b69056998b47745db6fa', 'name': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a68e61e8ff2d46327a37b69056998b47745db6fa', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a68e61e8ff2d46327a37b69056998b47745db6fa -

Information

Published : 2009-03-09 21:30

Updated : 2024-11-21 01:01


NVD link : CVE-2009-0859

Mitre link : CVE-2009-0859

CVE.ORG link : CVE-2009-0859


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-20

Improper Input Validation