CVE-2009-3547

HIGH EXPLOITED

Linux Kernel < 2.6.31.14 - Race Condition

Title source: rule

Description

Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.

Exploits (5)

exploitdb WORKING POC VERIFIED
by Earl Chew · bashlocallinux
https://www.exploit-db.com/exploits/10018
exploitdb WORKING POC VERIFIED
by teach & xipe · clocallinux
https://www.exploit-db.com/exploits/33322
exploitdb WORKING POC
by spender · clocallinux
https://www.exploit-db.com/exploits/40812
exploitdb WORKING POC VERIFIED
by Matthew Bergin · pythonlocallinux
https://www.exploit-db.com/exploits/9844
exploitdb WORKING POC VERIFIED
by teach & xipe · clocallinux
https://www.exploit-db.com/exploits/33321

References (29)

... and 9 more

Scores

CVSS v3 7.0
EPSS 0.0305
EPSS Percentile 86.5%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2026-02-09

Classification

CWE
CWE-362 CWE-476 CWE-672
Status draft

Affected Products (32)

linux/linux_kernel < 2.6.31.14
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
novell/linux_desktop
opensuse/opensuse
opensuse/opensuse
suse/suse_linux_enterprise_desktop
suse/suse_linux_enterprise_server
canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
... and 17 more

Timeline

Published Nov 04, 2009
Tracked Since Feb 18, 2026