First published: Tue Aug 18 2009(Updated: )
The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.30-rc2 | |
Linux Kernel | =2.6.30-rc3 | |
Linux Kernel | =2.6.30-rc4 | |
Linux Kernel | =2.6.30-rc5 | |
Linux Kernel | <=2.6.29.5 | |
Linux Kernel | =2.6.30-rc6 | |
Linux Kernel | =2.6.30-rc1 | |
Linux Kernel | =2.6.30 | |
SUSE Linux Enterprise Server | =9 | |
Novell Linux Desktop | =9 | |
openSUSE | =11.0 | |
SUSE Linux Enterprise Server | =10-sp2 | |
SUSE Linux Enterprise Desktop with Beagle | =10-sp2 | |
Fedoraproject Fedora | =11 | |
Ubuntu Linux | =9.04 | |
Ubuntu Linux | =8.10 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =6.06 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux desktop | =3.0 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux workstation | =3.0 | |
redhat enterprise Linux server | =3.0 | |
VMware ESX | =4.0 | |
VMware vMA | =4.0 | |
Red Hat Enterprise Linux | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.