CVE-2009-2848

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.9 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:C
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 20%
VendorProductVersion
linuxlinux_kernel
𝑥
≤ 2.6.29.5
linuxlinux_kernel
2.6.30
linuxlinux_kernel
2.6.30:rc1
linuxlinux_kernel
2.6.30:rc2
linuxlinux_kernel
2.6.30:rc3
linuxlinux_kernel
2.6.30:rc4
linuxlinux_kernel
2.6.30:rc5
linuxlinux_kernel
2.6.30:rc6
opensuseopensuse
11.0
canonicalubuntu_linux
6.06
canonicalubuntu_linux
8.04
canonicalubuntu_linux
8.10
canonicalubuntu_linux
9.04
redhatenterprise_linux_desktop
3.0
redhatenterprise_linux_desktop
5.0
redhatenterprise_linux_server
3.0
redhatenterprise_linux_server
5.0
redhatenterprise_linux_workstation
3.0
redhatenterprise_linux_workstation
5.0
vmwareesx
4.0
vmwarevma
4.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
jaunty
Fixed 2.6.28-16.55
released
intrepid
Fixed 2.6.27-15.43
released
hardy
Fixed 2.6.24-25.63
released
dapper
dne
linux-source-2.6.15
jaunty
dne
intrepid
dne
hardy
dne
dapper
Fixed 2.6.15-55.80
released
References