CVE-2009-1897

The tun_chr_poll function in drivers/net/tun.c in the tun subsystem in the Linux kernel 2.6.30 and 2.6.30.1, when the -fno-delete-null-pointer-checks gcc option is omitted, allows local users to gain privileges via vectors involving a NULL pointer dereference and an mmap of /dev/net/tun, a different vulnerability than CVE-2009-1894.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.9 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
VendorProductVersion
linuxlinux_kernel
2.6.30
linuxlinux_kernel
2.6.30:rc1
linuxlinux_kernel
2.6.30:rc2
linuxlinux_kernel
2.6.30:rc3
linuxlinux_kernel
2.6.30:rc4
linuxlinux_kernel
2.6.30:rc5
linuxlinux_kernel
2.6.30:rc6
linuxlinux_kernel
2.6.30:rc7-git6
linuxlinux_kernel
2.6.30.1
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
jaunty
not-affected
intrepid
not-affected
hardy
not-affected
dapper
dne
linux-source-2.6.15
jaunty
dne
intrepid
dne
hardy
dne
dapper
not-affected
References