Linux Kernel up to 2.6.13 signal.c handle_stop_signal deadlock

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.9 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, was found in Linux Kernel. Impacted is the function handle_stop_signal of the file signal.c. The manipulation results in deadlock.
This vulnerability is known as CVE-2005-3847. No exploit is available.
You should upgrade the affected component.
Details
A vulnerability, which was classified as problematic, was found in Linux Kernel (Operating System). Affected is the function handle_stop_signal of the file signal.c. The manipulation with an unknown input leads to a deadlock vulnerability. CWE is classifying the issue as CWE-833. The product contains multiple threads or executable segments that are waiting for each other to release a necessary lock, resulting in deadlock. This is going to have an impact on availability. CVE summarizes:
The handle_stop_signal function in signal.c in Linux kernel 2.6.11 up to other versions before 2.6.13 and 2.6.12.6 allows local users to cause a denial of service (deadlock) by sending a SIGKILL to a real-time threaded process while it is performing a core dump.
The issue has been introduced in 03/02/2005. The weakness was published 11/26/2005 with SuSE (Website). The advisory is shared for download at kernel.org. This vulnerability is traded as CVE-2005-3847. The exploitability is told to be difficult. The attack needs to be approached locally. The exploitation doesn't require any form of authentication. There are known technical details, but no exploit is available.
The vulnerability was handled as a non-public zero-day exploit for at least 269 days. During that time the estimated underground price was around $0-$5k. The vulnerability scanner Nessus provides a plugin with the ID 22559 (Debian DSA-1017-1 : kernel-source-2.6.8 - several vulnerabilities), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Debian Local Security Checks.
Upgrading to version 2.6.11 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (24546), Tenable (22559), SecurityFocus (BID 16856†), Secunia (SA19374†) and Vulnerability Center (SBV-24243†). Similar entries are available at VDB-27058, VDB-26097, VDB-28521 and VDB-28211. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Type
Vendor
Name
Version
- 2.6.11
- 2.6.11.1
- 2.6.11.2
- 2.6.11.3
- 2.6.11.4
- 2.6.11.5
- 2.6.11.6
- 2.6.11.7
- 2.6.11.8
- 2.6.11.9
- 2.6.11.10
- 2.6.11.11
- 2.6.11.12
- 2.6.12
- 2.6.12.1
- 2.6.12.2
- 2.6.12.3
- 2.6.12.4
- 2.6.12.5
- 2.6.12.6
- 2.6.13
License
Website
- Vendor: https://www.kernel.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.1VulDB Meta Temp Score: 4.9
VulDB Base Score: 5.1
VulDB Temp Score: 4.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: DeadlockCWE: CWE-833 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 22559
Nessus Name: Debian DSA-1017-1 : kernel-source-2.6.8 - several vulnerabilities
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
OpenVAS ID: 56469
OpenVAS Name: Debian Security Advisory DSA 1017-1 (kernel-source-2.6.8)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Kernel 2.6.11
Timeline
03/02/2005 🔍08/17/2005 🔍
08/17/2005 🔍
11/26/2005 🔍
11/26/2005 🔍
11/26/2005 🔍
11/30/2009 🔍
03/11/2015 🔍
05/17/2025 🔍
Sources
Vendor: kernel.orgAdvisory: kernel.org
Organization: SuSE
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2005-3847 (🔍)
GCVE (CVE): GCVE-0-2005-3847
GCVE (VulDB): GCVE-100-27120
X-Force: 24546
SecurityFocus: 16856 - Linux Kernel handle_stop_signal Denial of Service Vulnerability
Secunia: 19374
Vulnerability Center: 24243 - Linux Kernel Prior to 2.6.12.6 handle_stop_signal Function Local DoS Vulnerability via SIGKILL, Medium
See also: 🔍
Entry
Created: 03/11/2015 23:39Updated: 05/17/2025 21:01
Changes: 03/11/2015 23:39 (63), 02/17/2017 12:25 (9), 07/06/2021 16:34 (4), 07/06/2021 16:41 (1), 05/17/2025 21:01 (17)
Complete: 🔍
Cache ID: 216:1B7:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.