First published: Thu Jul 16 2009(Updated: )
The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <=2.6.31 | |
Linux kernel | =2.6.31-rc1 | |
Linux kernel | =2.6.31-rc2 | |
Debian | =5.0 | |
Debian | =4.0 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =9.04 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =8.10 | |
Linux Kernel | <=2.6.31 | |
Linux Kernel | =2.6.31-rc1 | |
Linux Kernel | =2.6.31-rc2 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Ubuntu | =9.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1895 is classified as a moderate severity vulnerability.
To fix CVE-2009-1895, update the Linux kernel to version 2.6.31 or newer.
CVE-2009-1895 affects Linux kernel versions prior to 2.6.31, as well as specific versions of Debian and Ubuntu.
CVE-2009-1895 is a local privilege escalation vulnerability in the Linux kernel's personality subsystem.
Exploitation of CVE-2009-1895 can allow local users to gain elevated privileges.