Unrated severityNVD Advisory· Published Apr 17, 2009· Updated Apr 23, 2026
CVE-2009-1186
CVE-2009-1186
Description
Buffer overflow in the util_path_encode function in udev/lib/libudev-util.c in udev before 1.4.1 allows local users to cause a denial of service (service outage) via vectors that trigger a call with crafted arguments.
Affected products
18cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:*
- cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
24- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2009-04/msg00006.htmlnvdMailing ListThird Party Advisory
- slackware.com/security/viewer.phpnvdThird Party Advisory
- www.debian.org/security/2009/dsa-1772nvdThird Party Advisory
- www.gentoo.org/security/en/glsa/glsa-200904-18.xmlnvdThird Party Advisory
- www.securityfocus.com/archive/1/502752/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/34539nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/idnvdBroken LinkThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/usn-758-1nvdThird Party Advisory
- launchpad.net/bugs/cve/2009-1186nvdThird Party Advisory
- www.redhat.com/archives/fedora-package-announce/2009-April/msg00462.htmlnvdMailing ListThird Party Advisory
- www.redhat.com/archives/fedora-package-announce/2009-April/msg00463.htmlnvdMailing ListThird Party Advisory
- secunia.com/advisories/34731nvdNot Applicable
- secunia.com/advisories/34750nvdNot Applicable
- secunia.com/advisories/34753nvdNot Applicable
- secunia.com/advisories/34771nvdNot Applicable
- secunia.com/advisories/34776nvdNot Applicable
- secunia.com/advisories/34785nvdNot Applicable
- secunia.com/advisories/34787nvdNot Applicable
- secunia.com/advisories/34801nvdNot Applicable
- wiki.rpath.com/Advisories:rPSA-2009-0063nvdBroken Link
- wiki.rpath.com/wiki/Advisories:rPSA-2009-0063nvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.vupen.com/english/advisories/2009/1053nvdPermissions Required
News mentions
0No linked articles in our index yet.