CVE-2009-2698

The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00008.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1222.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1223.html Third Party Advisory
http://secunia.com/advisories/23073 Broken Link Vendor Advisory
http://secunia.com/advisories/36430 Broken Link Vendor Advisory
http://secunia.com/advisories/36510 Broken Link Vendor Advisory
http://secunia.com/advisories/37105 Broken Link Vendor Advisory
http://secunia.com/advisories/37298 Broken Link Vendor Advisory
http://secunia.com/advisories/37471 Broken Link Vendor Advisory
http://support.avaya.com/css/P8/documents/100067254 Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 Broken Link Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 Broken Link Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/08/25/1 Mailing List
http://www.redhat.com/support/errata/RHSA-2009-1233.html Broken Link Third Party Advisory
http://www.securityfocus.com/archive/1/507985/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/512019/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/36108 Broken Link Exploit Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1022761 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-852-1 Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2009-0016.html Third Party Advisory
http://www.vupen.com/english/advisories/2009/3316 Permissions Required
https://bugzilla.redhat.com/show_bug.cgi?id=518034 Issue Tracking Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 Broken Link Third Party Advisory
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00008.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1222.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1223.html Third Party Advisory
http://secunia.com/advisories/23073 Broken Link Vendor Advisory
http://secunia.com/advisories/36430 Broken Link Vendor Advisory
http://secunia.com/advisories/36510 Broken Link Vendor Advisory
http://secunia.com/advisories/37105 Broken Link Vendor Advisory
http://secunia.com/advisories/37298 Broken Link Vendor Advisory
http://secunia.com/advisories/37471 Broken Link Vendor Advisory
http://support.avaya.com/css/P8/documents/100067254 Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 Broken Link Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 Broken Link Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/08/25/1 Mailing List
http://www.redhat.com/support/errata/RHSA-2009-1233.html Broken Link Third Party Advisory
http://www.securityfocus.com/archive/1/507985/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/512019/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/36108 Broken Link Exploit Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1022761 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-852-1 Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2009-0016.html Third Party Advisory
http://www.vupen.com/english/advisories/2009/3316 Permissions Required
https://bugzilla.redhat.com/show_bug.cgi?id=518034 Issue Tracking Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 Broken Link Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:05

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 - Broken Link () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00008.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00008.html - Mailing List, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2009-1222.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2009-1222.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2009-1223.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2009-1223.html - Third Party Advisory
References () http://secunia.com/advisories/23073 - Broken Link, Vendor Advisory () http://secunia.com/advisories/23073 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/36430 - Broken Link, Vendor Advisory () http://secunia.com/advisories/36430 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/36510 - Broken Link, Vendor Advisory () http://secunia.com/advisories/36510 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/37105 - Broken Link, Vendor Advisory () http://secunia.com/advisories/37105 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/37298 - Broken Link, Vendor Advisory () http://secunia.com/advisories/37298 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/37471 - Broken Link, Vendor Advisory () http://secunia.com/advisories/37471 - Broken Link, Vendor Advisory
References () http://support.avaya.com/css/P8/documents/100067254 - Third Party Advisory () http://support.avaya.com/css/P8/documents/100067254 - Third Party Advisory
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 - Broken Link, Vendor Advisory () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 - Broken Link, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 - Broken Link, Third Party Advisory () http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 - Broken Link, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2009/08/25/1 - Mailing List () http://www.openwall.com/lists/oss-security/2009/08/25/1 - Mailing List
References () http://www.redhat.com/support/errata/RHSA-2009-1233.html - Broken Link, Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2009-1233.html - Broken Link, Third Party Advisory
References () http://www.securityfocus.com/archive/1/507985/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/507985/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/archive/1/512019/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/512019/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/36108 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/36108 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1022761 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1022761 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-852-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-852-1 - Third Party Advisory
References () http://www.vmware.com/security/advisories/VMSA-2009-0016.html - Third Party Advisory () http://www.vmware.com/security/advisories/VMSA-2009-0016.html - Third Party Advisory
References () http://www.vupen.com/english/advisories/2009/3316 - Permissions Required () http://www.vupen.com/english/advisories/2009/3316 - Permissions Required
References () https://bugzilla.redhat.com/show_bug.cgi?id=518034 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=518034 - Issue Tracking, Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 - Broken Link, Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 - Broken Link, Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 - Broken Link, Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 - Broken Link, Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 - Broken Link, Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 - Broken Link, Third Party Advisory

28 Dec 2023, 15:22

Type Values Removed Values Added
CVSS v2 : 7.2
v3 : unknown
v2 : 7.2
v3 : 7.8
CPE cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
First Time Redhat enterprise Linux Desktop
Fedoraproject fedora
Fedoraproject
Vmware vcenter Server
Redhat enterprise Linux Workstation
Redhat enterprise Linux Eus
Redhat enterprise Linux Server Aus
Vmware esxi
Redhat
Redhat enterprise Linux Server
Vmware
References (CONFIRM) http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 - Vendor Advisory (CONFIRM) http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 - Broken Link, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/36108 - Exploit, Patch, Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/36108 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/23073 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/23073 - Broken Link, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/36510 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/36510 - Broken Link, Vendor Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2009-1223.html - Vendor Advisory (REDHAT) http://rhn.redhat.com/errata/RHSA-2009-1223.html - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/37105 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/37105 - Broken Link, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/37298 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/37298 - Broken Link, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/37471 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/37471 - Broken Link, Vendor Advisory
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 - Third Party Advisory (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 - Broken Link, Third Party Advisory
References (SECTRACK) http://www.securitytracker.com/id?1022761 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id?1022761 - Broken Link, Third Party Advisory, VDB Entry
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 - Third Party Advisory (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 - Broken Link, Third Party Advisory
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2009-1233.html - Third Party Advisory (REDHAT) http://www.redhat.com/support/errata/RHSA-2009-1233.html - Broken Link, Third Party Advisory
References (BUGTRAQ) http://www.securityfocus.com/archive/1/507985/100/0/threaded - Third Party Advisory, VDB Entry (BUGTRAQ) http://www.securityfocus.com/archive/1/507985/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 - Third Party Advisory (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 - Broken Link, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/36430 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/36430 - Broken Link, Vendor Advisory
References (BUGTRAQ) http://www.securityfocus.com/archive/1/512019/100/0/threaded - Third Party Advisory, VDB Entry (BUGTRAQ) http://www.securityfocus.com/archive/1/512019/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 - Third Party Advisory (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 - Broken Link, Third Party Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2009-1222.html - Vendor Advisory (REDHAT) http://rhn.redhat.com/errata/RHSA-2009-1222.html - Third Party Advisory
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 - Broken Link

07 Nov 2023, 02:04

Type Values Removed Values Added
References
  • {'url': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1e0c14f49d6b393179f423abbac47f85618d3d46', 'name': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1e0c14f49d6b393179f423abbac47f85618d3d46', 'tags': ['Vendor Advisory'], 'refsource': 'CONFIRM'}
  • () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 -

Information

Published : 2009-08-27 17:30

Updated : 2024-11-21 01:05


NVD link : CVE-2009-2698

Mitre link : CVE-2009-2698

CVE.ORG link : CVE-2009-2698


JSON object : View

Products Affected

redhat

  • enterprise_linux_server_aus
  • enterprise_linux_eus
  • enterprise_linux_workstation
  • enterprise_linux_desktop
  • enterprise_linux_server

suse

  • linux_enterprise_desktop
  • linux_enterprise_server

vmware

  • esxi
  • vcenter_server

canonical

  • ubuntu_linux

linux

  • linux_kernel

fedoraproject

  • fedora
CWE
CWE-476

NULL Pointer Dereference