Skip to content

The execve function in the Linux kernel, possibly 2.6.30...

Moderate severity Unreviewed Published May 2, 2022 to the GitHub Advisory Database • Updated Jan 31, 2023

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.

References

Published by the National Vulnerability Database Aug 18, 2009
Published to the GitHub Advisory Database May 2, 2022
Last updated Jan 31, 2023

Severity

Moderate

EPSS score

0.052%
(21st percentile)

Weaknesses

CVE ID

CVE-2009-2848

GHSA ID

GHSA-2589-6chq-5gj4

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.