The handle_stop_signal function in signal.c in Linux kernel 2.6.11 up to other versions before 2.6.13 and 2.6.12.6 allows local users to cause a denial of service (deadlock) by sending a SIGKILL to a real-time threaded process while it is performing a core dump.
Threat-Mapped Scoring
Score: 1.5
Priority: P4 - Informational (Low)
EPSS
Score: 0.00067Percentile:
0.211
CVSS Scoring
CVSS v3.1 Score: 5.5
Severity: MEDIUM
Mapped CWE(s)
CWE-667
: Improper Locking
All CAPEC(s)
CAPEC-25 : Forced Deadlock
CAPEC-26 : Leveraging Race Conditions
CAPEC-27 : Leveraging Race Conditions via Symbolic Links
CAPEC(s) with Mapped TTPs
CAPEC-25 : Forced Deadlock
Mapped TTPs:
T1499.004
: Application or System Exploitation
Mapped ATT&CK TTPs
T1499.004
: Application or System Exploitation
Kill Chain: impact
Malware
APTs Threat Group Associations
Campaigns
Affected Products
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
← Back to Home
BrownCoat Threat Intelligence Platform | 2025 Steve Gray — You Can’t Take the Sky from Me