CVE-2009-2848

EUVD-2009-2838
The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.9 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 22%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
𝑥
≤ 2.6.29.5
linuxlinux_kernel
2.6.30
linuxlinux_kernel
2.6.30:rc1
linuxlinux_kernel
2.6.30:rc2
linuxlinux_kernel
2.6.30:rc3
linuxlinux_kernel
2.6.30:rc4
linuxlinux_kernel
2.6.30:rc5
linuxlinux_kernel
2.6.30:rc6
opensuseopensuse
11.0
canonicalubuntu_linux
6.06
canonicalubuntu_linux
8.04
canonicalubuntu_linux
8.10
canonicalubuntu_linux
9.04
redhatenterprise_linux_desktop
3.0
redhatenterprise_linux_desktop
5.0
redhatenterprise_linux_server
3.0
redhatenterprise_linux_server
5.0
redhatenterprise_linux_workstation
3.0
redhatenterprise_linux_workstation
5.0
vmwareesx
4.0
vmwarevma
4.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
dapper
dne
hardy
Fixed 2.6.24-25.63
released
intrepid
Fixed 2.6.27-15.43
released
jaunty
Fixed 2.6.28-16.55
released
linux-source-2.6.15
dapper
Fixed 2.6.15-55.80
released
hardy
dne
intrepid
dne
jaunty
dne
References