CVE-2009-2847
18.08.2009, 21:00
The do_sigaltstack function in kernel/signal.c in Linux kernel 2.4 through 2.4.37 and 2.6 before 2.6.31-rc5, when running on 64-bit systems, does not clear certain padding bytes from a structure, which allows local users to obtain sensitive information from the kernel stack via the sigaltstack function.Enginsight
Vendor | Product | Version |
---|---|---|
linux | kernel | 2.6.24.7 |
linux | kernel | 2.6.25.15 |
linux | linux_kernel | 𝑥 ≤ 2.6.16.31 |
linux | linux_kernel | 2.6 |
linux | linux_kernel | 2.6.0 |
linux | linux_kernel | 2.6.1 |
linux | linux_kernel | 2.6.10 |
linux | linux_kernel | 2.6.11 |
linux | linux_kernel | 2.6.11.1 |
linux | linux_kernel | 2.6.11.2 |
linux | linux_kernel | 2.6.11.3 |
linux | linux_kernel | 2.6.11.4 |
linux | linux_kernel | 2.6.11.5 |
linux | linux_kernel | 2.6.11.6 |
linux | linux_kernel | 2.6.11.7 |
linux | linux_kernel | 2.6.11.8 |
linux | linux_kernel | 2.6.11.9 |
linux | linux_kernel | 2.6.11.10 |
linux | linux_kernel | 2.6.11.11 |
linux | linux_kernel | 2.6.11.12 |
linux | linux_kernel | 2.6.12 |
linux | linux_kernel | 2.6.12.1 |
linux | linux_kernel | 2.6.12.2 |
linux | linux_kernel | 2.6.12.3 |
linux | linux_kernel | 2.6.12.4 |
linux | linux_kernel | 2.6.12.5 |
linux | linux_kernel | 2.6.12.6 |
linux | linux_kernel | 2.6.13 |
linux | linux_kernel | 2.6.13.1 |
linux | linux_kernel | 2.6.13.2 |
linux | linux_kernel | 2.6.13.3 |
linux | linux_kernel | 2.6.13.4 |
linux | linux_kernel | 2.6.13.5 |
linux | linux_kernel | 2.6.14 |
linux | linux_kernel | 2.6.14.1 |
linux | linux_kernel | 2.6.14.2 |
linux | linux_kernel | 2.6.14.3 |
linux | linux_kernel | 2.6.14.4 |
linux | linux_kernel | 2.6.14.5 |
linux | linux_kernel | 2.6.14.6 |
linux | linux_kernel | 2.6.14.7 |
linux | linux_kernel | 2.6.15 |
linux | linux_kernel | 2.6.15.1 |
linux | linux_kernel | 2.6.15.2 |
linux | linux_kernel | 2.6.15.3 |
linux | linux_kernel | 2.6.15.4 |
linux | linux_kernel | 2.6.15.5 |
linux | linux_kernel | 2.6.15.6 |
linux | linux_kernel | 2.6.15.7 |
linux | linux_kernel | 2.6.16 |
linux | linux_kernel | 2.6.16.1 |
linux | linux_kernel | 2.6.16.2 |
linux | linux_kernel | 2.6.16.3 |
linux | linux_kernel | 2.6.16.10 |
linux | linux_kernel | 2.6.16.11 |
linux | linux_kernel | 2.6.16.12 |
linux | linux_kernel | 2.6.16.13 |
linux | linux_kernel | 2.6.16.14 |
linux | linux_kernel | 2.6.16.15 |
linux | linux_kernel | 2.6.16.16 |
linux | linux_kernel | 2.6.16.17 |
linux | linux_kernel | 2.6.16.18 |
linux | linux_kernel | 2.6.16.19 |
linux | linux_kernel | 2.6.16.20 |
linux | linux_kernel | 2.6.16.21 |
linux | linux_kernel | 2.6.16.22 |
linux | linux_kernel | 2.6.16.23 |
linux | linux_kernel | 2.6.16.24 |
linux | linux_kernel | 2.6.16.25 |
linux | linux_kernel | 2.6.16.26 |
linux | linux_kernel | 2.6.16.27 |
linux | linux_kernel | 2.6.16.28 |
linux | linux_kernel | 2.6.16.29 |
linux | linux_kernel | 2.6.16.30 |
linux | linux_kernel | 2.6.16.31 |
linux | linux_kernel | 2.6.16.31:-rc1 |
linux | linux_kernel | 2.6.16.31:-rc2 |
linux | linux_kernel | 2.6.16.31:-rc3 |
linux | linux_kernel | 2.6.16.31:-rc4 |
𝑥
= Vulnerable software versions

Ubuntu Releases
References