VYPR
High severity7.0NVD Advisory· Published Nov 4, 2009· Updated Apr 23, 2026

CVE-2009-3547

CVE-2009-3547

Description

Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.

Affected products

32
  • cpe:2.3:a:redhat:mrg_realtime:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:vma:4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
  • Linux/Kernel7 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 6 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: <=2.6.31.14
    • cpe:2.3:o:linux:linux_kernel:2.6.32:-:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.32:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:*
  • cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OpenSUSE/openSUSE2 versions
    cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_eus:5.4:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp2:*:*:*:*:*:*
  • cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

28

News mentions

0

No linked articles in our index yet.