First published: Tue Aug 18 2009(Updated: )
The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.30-rc2 | |
Linux Kernel | =2.6.30-rc3 | |
Linux Kernel | =2.6.30-rc4 | |
Linux Kernel | =2.6.30-rc5 | |
Linux Kernel | <=2.6.29.5 | |
Linux Kernel | =2.6.30-rc6 | |
Linux Kernel | =2.6.30-rc1 | |
Linux Kernel | =2.6.30 | |
SUSE Linux Enterprise Server | =9 | |
Novell Linux Desktop | =9 | |
SUSE Linux | =11.0 | |
SUSE Linux Enterprise Server | =10-sp2 | |
SUSE Linux Enterprise Desktop | =10-sp2 | |
Fedora | =11 | |
Ubuntu | =9.04 | |
Ubuntu | =8.10 | |
Ubuntu | =8.04 | |
Ubuntu | =6.06 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Desktop | =3.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Workstation | =3.0 | |
Red Hat Enterprise Linux Server | =3.0 | |
VMware ESXi | =4.0 | |
VMware vMA | =4.0 | |
Red Hat Enterprise Linux | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2848 has a high severity rating due to its potential to cause a denial of service and possibly allow privilege escalation.
To fix CVE-2009-2848, upgrade your Linux kernel to a version beyond 2.6.30-rc6 that includes the necessary security patches.
CVE-2009-2848 affects various Linux kernel versions including 2.6.30 and earlier versions, specifically the rc1 through rc6 releases and some older distributions.
The potential impacts of CVE-2009-2848 include memory corruption, denial of service, and unauthorized privilege escalation.
CVE-2009-2848 is a local vulnerability, allowing local users to exploit it for denial of service or privilege escalation.