CVE-2009-2698

The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00008.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1222.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1223.html Third Party Advisory
http://secunia.com/advisories/23073 Broken Link Vendor Advisory
http://secunia.com/advisories/36430 Broken Link Vendor Advisory
http://secunia.com/advisories/36510 Broken Link Vendor Advisory
http://secunia.com/advisories/37105 Broken Link Vendor Advisory
http://secunia.com/advisories/37298 Broken Link Vendor Advisory
http://secunia.com/advisories/37471 Broken Link Vendor Advisory
http://support.avaya.com/css/P8/documents/100067254 Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 Broken Link Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 Broken Link Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/08/25/1 Mailing List
http://www.redhat.com/support/errata/RHSA-2009-1233.html Broken Link Third Party Advisory
http://www.securityfocus.com/archive/1/507985/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/512019/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/36108 Broken Link Exploit Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1022761 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-852-1 Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2009-0016.html Third Party Advisory
http://www.vupen.com/english/advisories/2009/3316 Permissions Required
https://bugzilla.redhat.com/show_bug.cgi?id=518034 Issue Tracking Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 Broken Link Third Party Advisory
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00008.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1222.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1223.html Third Party Advisory
http://secunia.com/advisories/23073 Broken Link Vendor Advisory
http://secunia.com/advisories/36430 Broken Link Vendor Advisory
http://secunia.com/advisories/36510 Broken Link Vendor Advisory
http://secunia.com/advisories/37105 Broken Link Vendor Advisory
http://secunia.com/advisories/37298 Broken Link Vendor Advisory
http://secunia.com/advisories/37471 Broken Link Vendor Advisory
http://support.avaya.com/css/P8/documents/100067254 Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 Broken Link Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 Broken Link Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/08/25/1 Mailing List
http://www.redhat.com/support/errata/RHSA-2009-1233.html Broken Link Third Party Advisory
http://www.securityfocus.com/archive/1/507985/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/512019/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/36108 Broken Link Exploit Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1022761 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-852-1 Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2009-0016.html Third Party Advisory
http://www.vupen.com/english/advisories/2009/3316 Permissions Required
https://bugzilla.redhat.com/show_bug.cgi?id=518034 Issue Tracking Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 Broken Link Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:05

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 - Broken Link () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00008.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00008.html - Mailing List, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2009-1222.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2009-1222.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2009-1223.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2009-1223.html - Third Party Advisory
References () http://secunia.com/advisories/23073 - Broken Link, Vendor Advisory () http://secunia.com/advisories/23073 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/36430 - Broken Link, Vendor Advisory () http://secunia.com/advisories/36430 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/36510 - Broken Link, Vendor Advisory () http://secunia.com/advisories/36510 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/37105 - Broken Link, Vendor Advisory () http://secunia.com/advisories/37105 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/37298 - Broken Link, Vendor Advisory () http://secunia.com/advisories/37298 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/37471 - Broken Link, Vendor Advisory () http://secunia.com/advisories/37471 - Broken Link, Vendor Advisory
References () http://support.avaya.com/css/P8/documents/100067254 - Third Party Advisory () http://support.avaya.com/css/P8/documents/100067254 - Third Party Advisory
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 - Broken Link, Vendor Advisory () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 - Broken Link, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 - Broken Link, Third Party Advisory () http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 - Broken Link, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2009/08/25/1 - Mailing List () http://www.openwall.com/lists/oss-security/2009/08/25/1 - Mailing List
References () http://www.redhat.com/support/errata/RHSA-2009-1233.html - Broken Link, Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2009-1233.html - Broken Link, Third Party Advisory
References () http://www.securityfocus.com/archive/1/507985/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/507985/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/archive/1/512019/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/512019/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/36108 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/36108 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1022761 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1022761 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-852-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-852-1 - Third Party Advisory
References () http://www.vmware.com/security/advisories/VMSA-2009-0016.html - Third Party Advisory () http://www.vmware.com/security/advisories/VMSA-2009-0016.html - Third Party Advisory
References () http://www.vupen.com/english/advisories/2009/3316 - Permissions Required () http://www.vupen.com/english/advisories/2009/3316 - Permissions Required
References () https://bugzilla.redhat.com/show_bug.cgi?id=518034 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=518034 - Issue Tracking, Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 - Broken Link, Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 - Broken Link, Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 - Broken Link, Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 - Broken Link, Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 - Broken Link, Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 - Broken Link, Third Party Advisory

28 Dec 2023, 15:22

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 - Broken Link
References () http://rhn.redhat.com/errata/RHSA-2009-1222.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2009-1222.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2009-1223.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2009-1223.html - Third Party Advisory
References () http://secunia.com/advisories/23073 - Vendor Advisory () http://secunia.com/advisories/23073 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/36430 - Vendor Advisory () http://secunia.com/advisories/36430 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/36510 - Vendor Advisory () http://secunia.com/advisories/36510 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/37105 - Vendor Advisory () http://secunia.com/advisories/37105 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/37298 - Vendor Advisory () http://secunia.com/advisories/37298 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/37471 - Vendor Advisory () http://secunia.com/advisories/37471 - Broken Link, Vendor Advisory
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 - Vendor Advisory () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19 - Broken Link, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 - Third Party Advisory () http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 - Broken Link, Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2009-1233.html - Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2009-1233.html - Broken Link, Third Party Advisory
References () http://www.securityfocus.com/archive/1/507985/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/507985/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/archive/1/512019/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/512019/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/36108 - Exploit, Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/36108 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1022761 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1022761 - Broken Link, Third Party Advisory, VDB Entry
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 - Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514 - Broken Link, Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 - Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557 - Broken Link, Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 - Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142 - Broken Link, Third Party Advisory
CVSS v2 : 7.2
v3 : unknown
v2 : 7.2
v3 : 7.8
First Time Redhat enterprise Linux Server
Redhat enterprise Linux Workstation
Vmware
Redhat enterprise Linux Desktop
Vmware esxi
Fedoraproject fedora
Redhat
Fedoraproject
Vmware vcenter Server
Redhat enterprise Linux Server Aus
Redhat enterprise Linux Eus

Information

Published : 2009-08-27 17:30

Updated : 2025-04-09 00:30


NVD link : CVE-2009-2698

Mitre link : CVE-2009-2698

CVE.ORG link : CVE-2009-2698


JSON object : View

Products Affected

redhat

  • enterprise_linux_workstation
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_eus
  • enterprise_linux_server

vmware

  • esxi
  • vcenter_server

suse

  • linux_enterprise_desktop
  • linux_enterprise_server

linux

  • linux_kernel

canonical

  • ubuntu_linux

fedoraproject

  • fedora
CWE
CWE-476

NULL Pointer Dereference