CVE-2009-2698

The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00008.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1222.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1223.html Third Party Advisory
http://secunia.com/advisories/23073 Broken Link Vendor Advisory
http://secunia.com/advisories/36430 Broken Link Vendor Advisory
http://secunia.com/advisories/36510 Broken Link Vendor Advisory
http://secunia.com/advisories/37105 Broken Link Vendor Advisory
http://secunia.com/advisories/37298 Broken Link Vendor Advisory
http://secunia.com/advisories/37471 Broken Link Vendor Advisory
http://support.avaya.com/css/P8/documents/100067254 Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 Broken Link Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 Broken Link Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/08/25/1 Mailing List
http://www.redhat.com/support/errata/RHSA-2009-1233.html Broken Link Third Party Advisory
http://www.securityfocus.com/archive/1/507985/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/512019/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/36108 Broken Link Exploit Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1022761 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-852-1 Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2009-0016.html Third Party Advisory
http://www.vupen.com/english/advisories/2009/3316 Permissions Required
https://bugzilla.redhat.com/show_bug.cgi?id=518034 Issue Tracking Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 Broken Link Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*

History

28 Dec 2023, 15:22

Type Values Removed Values Added
CPE cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 - Broken Link
References () http://rhn.redhat.com/errata/RHSA-2009-1222.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2009-1222.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2009-1223.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2009-1223.html - Third Party Advisory
References () http://secunia.com/advisories/23073 - Vendor Advisory () http://secunia.com/advisories/23073 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/36430 - Vendor Advisory () http://secunia.com/advisories/36430 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/36510 - Vendor Advisory () http://secunia.com/advisories/36510 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/37105 - Vendor Advisory () http://secunia.com/advisories/37105 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/37298 - Vendor Advisory () http://secunia.com/advisories/37298 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/37471 - Vendor Advisory () http://secunia.com/advisories/37471 - Broken Link, Vendor Advisory
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 - Vendor Advisory () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 - Broken Link, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 - Third Party Advisory () http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 - Broken Link, Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2009-1233.html - Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2009-1233.html - Broken Link, Third Party Advisory
References () http://www.securityfocus.com/archive/1/507985/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/507985/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/archive/1/512019/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/512019/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/36108 - Exploit, Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/36108 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1022761 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1022761 - Broken Link, Third Party Advisory, VDB Entry
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 - Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 - Broken Link, Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 - Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 - Broken Link, Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 - Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 - Broken Link, Third Party Advisory
First Time Vmware vcenter Server
Redhat enterprise Linux Eus
Redhat
Redhat enterprise Linux Server
Redhat enterprise Linux Desktop
Fedoraproject fedora
Vmware
Vmware esxi
Fedoraproject
Redhat enterprise Linux Server Aus
Redhat enterprise Linux Workstation
CVSS v2 : 7.2
v3 : unknown
v2 : 7.2
v3 : 7.8

07 Nov 2023, 02:04

Type Values Removed Values Added
References
  • {'url': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1e0c14f49d6b393179f423abbac47f85618d3d46', 'name': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1e0c14f49d6b393179f423abbac47f85618d3d46', 'tags': ['Vendor Advisory'], 'refsource': 'CONFIRM'}
  • () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 -

Information

Published : 2009-08-27 17:30

Updated : 2023-12-28 15:22


NVD link : CVE-2009-2698

Mitre link : CVE-2009-2698

CVE.ORG link : CVE-2009-2698


JSON object : View

Products Affected

redhat

  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_server
  • enterprise_linux_workstation
  • enterprise_linux_eus

suse

  • linux_enterprise_server
  • linux_enterprise_desktop

vmware

  • esxi
  • vcenter_server

linux

  • linux_kernel

canonical

  • ubuntu_linux

fedoraproject

  • fedora
CWE
CWE-476

NULL Pointer Dereference