CVE-2009-1895
16.07.2009, 15:30
The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 𝑥 ≤ 2.6.31 |
linux | linux_kernel | 2.6.31:rc1 |
linux | linux_kernel | 2.6.31:rc2 |
debian | debian_linux | 4.0 |
debian | debian_linux | 5.0 |
canonical | ubuntu_linux | 6.06 |
canonical | ubuntu_linux | 8.04 |
canonical | ubuntu_linux | 8.10 |
canonical | ubuntu_linux | 9.04 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References