CVE-2009-2848
18.08.2009, 21:00
The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 𝑥 ≤ 2.6.29.5 |
linux | linux_kernel | 2.6.30 |
linux | linux_kernel | 2.6.30:rc1 |
linux | linux_kernel | 2.6.30:rc2 |
linux | linux_kernel | 2.6.30:rc3 |
linux | linux_kernel | 2.6.30:rc4 |
linux | linux_kernel | 2.6.30:rc5 |
linux | linux_kernel | 2.6.30:rc6 |
opensuse | opensuse | 11.0 |
canonical | ubuntu_linux | 6.06 |
canonical | ubuntu_linux | 8.04 |
canonical | ubuntu_linux | 8.10 |
canonical | ubuntu_linux | 9.04 |
redhat | enterprise_linux_desktop | 3.0 |
redhat | enterprise_linux_desktop | 5.0 |
redhat | enterprise_linux_server | 3.0 |
redhat | enterprise_linux_server | 5.0 |
redhat | enterprise_linux_workstation | 3.0 |
redhat | enterprise_linux_workstation | 5.0 |
vmware | esx | 4.0 |
vmware | vma | 4.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References