CVE-2009-1961

The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of file creation and removal) via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*

History

15 Feb 2024, 20:41

Type Values Removed Values Added
First Time Opensuse opensuse
Debian
Canonical
Suse linux Enterprise Desktop
Suse linux Enterprise
Suse linux Enterprise Server
Debian debian Linux
Opensuse
Suse
Canonical ubuntu Linux
CWE CWE-362 CWE-667
CPE cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29.rc1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29.rc2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.29.rc2-git1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : 1.9
v3 : unknown
v2 : 1.9
v3 : 4.7
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=7bfac9ecf0585962fe13584f5cf526d8c8e76f17 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=7bfac9ecf0585962fe13584f5cf526d8c8e76f17 - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html - Mailing List
References () http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html - Mailing List
References () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html - Mailing List
References () http://secunia.com/advisories/35390 - () http://secunia.com/advisories/35390 - Broken Link
References () http://secunia.com/advisories/35394 - () http://secunia.com/advisories/35394 - Broken Link
References () http://secunia.com/advisories/35656 - () http://secunia.com/advisories/35656 - Broken Link
References () http://secunia.com/advisories/35847 - () http://secunia.com/advisories/35847 - Broken Link
References () http://secunia.com/advisories/36051 - () http://secunia.com/advisories/36051 - Broken Link
References () http://securitytracker.com/id?1022307 - () http://securitytracker.com/id?1022307 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.debian.org/security/2009/dsa-1844 - () http://www.debian.org/security/2009/dsa-1844 - Mailing List, Patch
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:135 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:135 - Broken Link
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:148 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:148 - Broken Link
References () http://www.openwall.com/lists/oss-security/2009/05/29/2 - Patch () http://www.openwall.com/lists/oss-security/2009/05/29/2 - Mailing List, Patch
References () http://www.openwall.com/lists/oss-security/2009/05/30/1 - Exploit, Patch () http://www.openwall.com/lists/oss-security/2009/05/30/1 - Exploit, Mailing List, Patch
References () http://www.openwall.com/lists/oss-security/2009/06/02/2 - Exploit () http://www.openwall.com/lists/oss-security/2009/06/02/2 - Exploit, Mailing List
References () http://www.openwall.com/lists/oss-security/2009/06/03/1 - Exploit () http://www.openwall.com/lists/oss-security/2009/06/03/1 - Exploit, Mailing List
References () http://www.redhat.com/support/errata/RHSA-2009-1157.html - () http://www.redhat.com/support/errata/RHSA-2009-1157.html - Broken Link
References () http://www.securityfocus.com/bid/35143 - Exploit () http://www.securityfocus.com/bid/35143 - Broken Link, Exploit, Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/usn-793-1 - () http://www.ubuntu.com/usn/usn-793-1 - Third Party Advisory

07 Nov 2023, 02:04

Type Values Removed Values Added
References
  • {'url': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=7bfac9ecf0585962fe13584f5cf526d8c8e76f17', 'name': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=7bfac9ecf0585962fe13584f5cf526d8c8e76f17', 'tags': ['Exploit', 'Patch'], 'refsource': 'CONFIRM'}
  • () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=7bfac9ecf0585962fe13584f5cf526d8c8e76f17 -

Information

Published : 2009-06-08 01:00

Updated : 2024-02-15 20:41


NVD link : CVE-2009-1961

Mitre link : CVE-2009-1961

CVE.ORG link : CVE-2009-1961


JSON object : View

Products Affected

debian

  • debian_linux

suse

  • linux_enterprise_desktop
  • linux_enterprise_server
  • linux_enterprise

opensuse

  • opensuse

linux

  • linux_kernel

canonical

  • ubuntu_linux
CWE
CWE-667

Improper Locking