Description
The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1844-1 | New Linux 2.6.24 packages fix several vulnerabilities |
Debian DSA |
DSA-1845-1 | New Linux 2.6.26 packages fix several vulnerabilities |
EUVD |
EUVD-2009-1890 | The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR). |
Ubuntu USN |
USN-807-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T05:27:54.804Z
Reserved: 2009-06-02T00:00:00.000Z
Link: CVE-2009-1895
No data.
Status : Modified
Published: 2009-07-16T15:30:00.703
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-1895
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN