Lucene search

K
ubuntucveUbuntu.comUB:CVE-2009-2695
HistoryAug 28, 2009 - 12:00 a.m.

CVE-2009-2695

2009-08-2800:00:00
ubuntu.com
ubuntu.com
19
linux kernel
privilege escalation
mmap operations
low memory addresses
selinux
red hat enterprise linux
null pointer dereference
cap_sys_rawio
mmap_min_addr

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

10.1%

The Linux kernel before 2.6.31-rc7 does not properly prevent mmap
operations that target page zero and other low memory addresses, which
allows local users to gain privileges by exploiting NULL pointer
dereference vulnerabilities, related to (1) the default configuration of
the allow_unconfined_mmap_low boolean in SELinux on Red Hat Enterprise
Linux (RHEL) 5, (2) an error that causes allow_unconfined_mmap_low to be
ignored in the unconfined_t domain, (3) lack of a requirement for the
CAP_SYS_RAWIO capability for these mmap operations, and (4) interaction
between the mmap_min_addr protection mechanism and certain application
programs.

OSVersionArchitecturePackageVersionFilename
ubuntu8.04noarchlinux<Β 2.6.24-25.63UNKNOWN
ubuntu8.10noarchlinux<Β 2.6.27-15.43UNKNOWN
ubuntu9.04noarchlinux<Β 2.6.28-16.55UNKNOWN

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

10.1%