CVE-2009-1186
Summary
| CVE | CVE-2009-1186 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2009-04-17 14:30:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | Buffer overflow in the util_path_encode function in udev/lib/libudev-util.c in udev before 1.4.1 allows local users to cause a denial of service (service outage) via vectors that trigger a call with crafted arguments. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
LowAuthentication
NoneConfidentiality
NoneIntegrity
NoneAvailability
PartialAV:L/AC:L/Au:N/C:N/I:N/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 6.06 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 7.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 8.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 8.10 | All | All | All |
| Operating System | Debian | Debian Linux | 4.0 | All | All | All |
| Operating System | Debian | Debian Linux | 5.0 | All | All | All |
| Operating System | Fedoraproject | Fedora | 10 | All | All | All |
| Operating System | Fedoraproject | Fedora | 9 | All | All | All |
| Operating System | Opensuse | Opensuse | 10.3 | All | All | All |
| Operating System | Opensuse | Opensuse | 11.0 | All | All | All |
| Operating System | Opensuse | Opensuse | 11.1 | All | All | All |
| Application | Suse | Linux Enterprise Debuginfo | 10 | sp2 | All | All |
| Application | Suse | Linux Enterprise Debuginfo | 11 | - | All | All |
| Operating System | Suse | Linux Enterprise Desktop | 10 | sp2 | All | All |
| Operating System | Suse | Linux Enterprise Desktop | 11 | - | All | All |
| Operating System | Suse | Linux Enterprise Server | 10 | sp2 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11 | - | All | All |
| Application | Udev Project | Udev | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [SECURITY] Fedora 10 Update: udev-127-5.fc10 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Mailing List, Third Party Advisory |
| Fedora update for udev - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| Debian -- Security Information -- DSA-1772-1 udev | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Third Party Advisory |
| Ubuntu update for udev - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| Debian update for udev - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| udev Path Encoding Local Denial of Service Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Advisories:rPSA-2009-0063 - rPath Wiki | af854a3a-2127-422b-91ae-364da2661108 | wiki.rpath.com | Broken Link |
| [security-announce] SUSE Security Announcement: udev local privilege esc | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| git.kernel.org | af854a3a-2127-422b-91ae-364da2661108 | git.kernel.org | |
| Support / Security / Advisories / / MDVSA-2009:103 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | Broken Link |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Permissions Required |
| udev Denial of Service and Privilege Escalation - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| USN-758-1: udev vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | Third Party Advisory |
| Gentoo update for udev - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| [SECURITY] Fedora 9 Update: udev-124-4.fc9 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Mailing List, Third Party Advisory |
| Advisories:rPSA-2009-0063 - rPath Wiki | af854a3a-2127-422b-91ae-364da2661108 | wiki.rpath.com | Broken Link |
| CVE-2009-1186 | af854a3a-2127-422b-91ae-364da2661108 | launchpad.net | Third Party Advisory |
| Gentoo Linux Documentation -- udev: Multiple vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.gentoo.org | Third Party Advisory |
| Slackware update for udev - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| udev Buffer Overflow in util_path_encode() Lets Local Users Gain Elevated Privileges - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | Broken Link, Third Party Advisory, VDB Entry |
| The Slackware Linux Project: Slackware Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | slackware.com | Third Party Advisory |
| SUSE update for udev - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| rPath update for udev - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Not Applicable |
| Bug 495052 – CVE-2009-1186 udev: Buffer overflow in path encoding routine | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | Issue Tracking, Patch, Third Party Advisory |
| hotplug/udev.git - udev development tree | MITRE | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2009-04-17 | Tomas Hoger | Not vulnerable. This issue did not affect the versions of udev as shipped with Red Hat Enterprise Linux 4, or 5. |
There are currently no legacy QID mappings associated with this CVE.