5.9

CVE-2009-2848

Exploit

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version <= 2.6.29.5
LinuxLinux Kernel Version2.6.30 Update-
LinuxLinux Kernel Version2.6.30 Updaterc1
LinuxLinux Kernel Version2.6.30 Updaterc2
LinuxLinux Kernel Version2.6.30 Updaterc3
LinuxLinux Kernel Version2.6.30 Updaterc4
LinuxLinux Kernel Version2.6.30 Updaterc5
LinuxLinux Kernel Version2.6.30 Updaterc6
NovellLinux Desktop Version9
OpensuseOpensuse Version11.0
SuseLinux Enterprise Desktop Version10 Updatesp2
SuseLinux Enterprise Server Version10 Updatesp2
FedoraprojectFedora Version11
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version8.04
CanonicalUbuntu Linux Version8.10
CanonicalUbuntu Linux Version9.04
VMwareEsx Version4.0
VMwareVma Version4.0
   RedhatEnterprise Linux Version5.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.09% 0.262
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.9 3.4 8.5
AV:L/AC:M/Au:N/C:P/I:P/A:C
CWE-269 Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

http://www.openwall.com/lists/oss-security/2009/08/04/2
Third Party Advisory
Exploit
Mailing List
http://www.openwall.com/lists/oss-security/2009/08/05/10
Third Party Advisory
Exploit
Mailing List