CVE-2005-3847

The handle_stop_signal function in signal.c in Linux kernel 2.6.11 up to other versions before 2.6.13 and 2.6.12.6 allows local users to cause a denial of service (deadlock) by sending a SIGKILL to a real-time threaded process while it is performing a core dump.
References
Link Resource
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html Broken Link
http://marc.info/?l=linux-kernel&m=112430346613450&w=2 Mailing List Patch
http://marc.info/?l=linux-kernel&m=112508422716574&w=2 Mailing List Patch
http://secunia.com/advisories/19038 Broken Link Vendor Advisory
http://secunia.com/advisories/19374 Broken Link Vendor Advisory
http://www.debian.org/security/2006/dsa-1017 Patch Vendor Advisory
http://www.kernel.org/git/?p=linux/kernel/git/chrisw/stable-queue.git%3Ba=blob%3Bh=f6cc7e101c49f356e4c4df5cca1ff352a0f01dd5%3Bhb=9c5fcb99af7c157be45e9d53aeb857ded5211fcd%3Bf=2.6.12.6/nptl-signal-delivery-deadlock-fix.patch Broken Link
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=dd12f48d4e8774415b528d3991ae47c28f26e1ac%3Bhp=ade6648b3b11a5d81f6f28135193ab6d85d621db Broken Link
http://www.securityfocus.com/bid/16856 Broken Link Third Party Advisory VDB Entry
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html Broken Link
http://marc.info/?l=linux-kernel&m=112430346613450&w=2 Mailing List Patch
http://marc.info/?l=linux-kernel&m=112508422716574&w=2 Mailing List Patch
http://secunia.com/advisories/19038 Broken Link Vendor Advisory
http://secunia.com/advisories/19374 Broken Link Vendor Advisory
http://www.debian.org/security/2006/dsa-1017 Patch Vendor Advisory
http://www.kernel.org/git/?p=linux/kernel/git/chrisw/stable-queue.git%3Ba=blob%3Bh=f6cc7e101c49f356e4c4df5cca1ff352a0f01dd5%3Bhb=9c5fcb99af7c157be45e9d53aeb857ded5211fcd%3Bf=2.6.12.6/nptl-signal-delivery-deadlock-fix.patch Broken Link
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=dd12f48d4e8774415b528d3991ae47c28f26e1ac%3Bhp=ade6648b3b11a5d81f6f28135193ab6d85d621db Broken Link
http://www.securityfocus.com/bid/16856 Broken Link Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2005-11-27 00:03

Updated : 2025-04-03 01:03


NVD link : CVE-2005-3847

Mitre link : CVE-2005-3847

CVE.ORG link : CVE-2005-3847


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-667

Improper Locking