CVE-2009-2848

Publication date 18 August 2009

Last updated 24 July 2024


Ubuntu priority

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.

Status

Package Ubuntu Release Status
linux 9.04 jaunty
Fixed 2.6.28-16.55
8.10 intrepid
Fixed 2.6.27-15.43
8.04 LTS hardy
Fixed 2.6.24-25.63
6.06 LTS dapper Not in release
linux-source-2.6.15 9.04 jaunty Not in release
8.10 intrepid Not in release
8.04 LTS hardy Not in release
6.06 LTS dapper
Fixed 2.6.15-55.80

References

Related Ubuntu Security Notices (USN)

    • USN-852-1
    • Linux kernel vulnerabilities
    • 22 October 2009

Other references