CVE-2009-2768
Mandriva Linux Security Advisory 2011-051
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The load_flat_shared_library function in fs/binfmt_flat.c in the flat subsystem in the Linux kernel before 2.6.31-rc6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by executing a shared flat binary, which triggers an access of an "uninitialized cred pointer."
La función load_flat_shared_library en el archivo fs/binfmt_flat.c en el subsistema flat en el kernel de Linux anterior a versión 2.6.31-rc6, permite a los usuarios locales causar una denegación de servicio (desreferencia de un puntero NULL y bloqueo del sistema) o posiblemente tener otro impacto no especificado mediante la ejecución de un binario flat compartido, que activa el acceso de un "uninitialized cred pointer."
The Linux 2.6 kernel has been updated to mitigate multiple vulnerabilities related to denial of service, arbitrary code execution, stack memory disclosure, restriction bypass, and more.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-08-14 CVE Reserved
- 2009-08-14 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
- CWE-824: Access of Uninitialized Pointer
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3440625d78711bee41a84cf29c3d8c579b522666 | Broken Link | |
http://secunia.com/advisories/36278 | Broken Link | |
http://thread.gmane.org/gmane.linux.hardware.blackfin.kernel.devel/1905 | Broken Link | |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5 | Broken Link | |
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc6 | Broken Link | |
http://www.securityfocus.com/bid/36037 | Broken Link | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/52909 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lkml.org/lkml/2009/6/22/91 | 2024-02-09 | |
http://www.openwall.com/lists/oss-security/2009/08/13/1 | 2024-02-09 |
URL | Date | SRC |
---|---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 | 2024-02-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 2.6.31 Search vendor "Linux" for product "Linux Kernel" and version " < 2.6.31" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.31 Search vendor "Linux" for product "Linux Kernel" and version "2.6.31" | rc1 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.31 Search vendor "Linux" for product "Linux Kernel" and version "2.6.31" | rc2 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.31 Search vendor "Linux" for product "Linux Kernel" and version "2.6.31" | rc3 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.31 Search vendor "Linux" for product "Linux Kernel" and version "2.6.31" | rc4 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 2.6.31 Search vendor "Linux" for product "Linux Kernel" and version "2.6.31" | rc5 |
Affected
|