Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2589-6chq-5gj4

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.

Ссылки

EPSS

Процентиль: 20%
0.00063
Низкий

Дефекты

CWE-269

Связанные уязвимости

ubuntu
почти 16 лет назад

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.

redhat
почти 16 лет назад

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.

nvd
почти 16 лет назад

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.

debian
почти 16 лет назад

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earli ...

oracle-oval
почти 16 лет назад

ELSA-2009-1243: Oracle Enterprise Linux 5.4 kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 20%
0.00063
Низкий

Дефекты

CWE-269