Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-2848

Опубликовано: 18 авг. 2009
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.9

Описание

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

released

2.6.24-25.63
intrepid

released

2.6.27-15.43
jaunty

released

2.6.28-16.55
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

2.6.15-55.80
devel

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 20%
0.00063
Низкий

5.9 Medium

CVSS2

Связанные уязвимости

redhat
почти 16 лет назад

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.

nvd
почти 16 лет назад

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.

debian
почти 16 лет назад

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earli ...

github
около 3 лет назад

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.

oracle-oval
почти 16 лет назад

ELSA-2009-1243: Oracle Enterprise Linux 5.4 kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 20%
0.00063
Низкий

5.9 Medium

CVSS2