First published: Mon Oct 19 2009(Updated: )
net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=2.6.31.4 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =8.10 | |
Ubuntu Linux | =9.04 | |
Ubuntu Linux | =9.10 | |
Fedoraproject Fedora | =10 | |
openSUSE | =11.0 | |
openSUSE | =11.2 | |
SUSE Linux Enterprise Desktop | =10-sp2 | |
SUSE Linux Enterprise Desktop | =10-sp3 | |
SUSE Linux Enterprise Server | =10-sp2 | |
SUSE Linux Enterprise Server | =10-sp3 | |
VMware vMA | =4.0 | |
VMware ESX | =4.0 | |
Linux kernel | <=2.6.31.4 | |
Fedora | =10 | |
openSUSE libeconf | =11.0 | |
openSUSE libeconf | =11.2 | |
VMware ESXi | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3621 has a high severity rating due to its potential to cause a denial of service by hanging the system.
To fix CVE-2009-3621, upgrade your Linux kernel to a version later than 2.6.31.4.
CVE-2009-3621 affects Linux kernel versions 2.6.31.4 and earlier, along with specific releases of Ubuntu, Fedora, openSUSE, and SUSE Linux Enterprise.
CVE-2009-3621 is classified as a denial of service vulnerability that affects abstract-namespace AF_UNIX sockets.
Yes, local users can exploit CVE-2009-3621 by creating specific AF_UNIX sockets to cause the system to hang.