CVE-2009-2695

N/A Unknown
Published: August 28, 2009 Modified: April 23, 2026
View on NVD

Description

The Linux kernel before 2.6.31-rc7 does not properly prevent mmap operations that target page zero and other low memory addresses, which allows local users to gain privileges by exploiting NULL pointer dereference vulnerabilities, related to (1) the default configuration of the allow_unconfined_mmap_low boolean in SELinux on Red Hat Enterprise Linux (RHEL) 5, (2) an error that causes allow_unconfined_mmap_low to be ignored in the unconfined_t domain, (3) lack of a requirement for the CAP_SYS_RAWIO capability for these mmap operations, and (4) interaction between the mmap_min_addr protection mechanism and certain application programs.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://danwalsh.livejournal.com/30084.html
Source: cve@mitre.org
Exploit
http://patchwork.kernel.org/patch/36649/
Source: cve@mitre.org
Patch
http://secunia.com/advisories/36501
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/36051
Source: cve@mitre.org
Patch
http://danwalsh.livejournal.com/30084.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://eparis.livejournal.com/606.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://kbase.redhat.com/faq/docs/DOC-18042
Source: af854a3a-2127-422b-91ae-364da2661108
http://patchwork.kernel.org/patch/36539/
Source: af854a3a-2127-422b-91ae-364da2661108
http://patchwork.kernel.org/patch/36540/
Source: af854a3a-2127-422b-91ae-364da2661108
http://patchwork.kernel.org/patch/36649/
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://patchwork.kernel.org/patch/36650/
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/36501
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37105
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38794
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38834
Source: af854a3a-2127-422b-91ae-364da2661108
http://thread.gmane.org/gmane.linux.kernel.lsm/9075
Source: af854a3a-2127-422b-91ae-364da2661108
http://twitter.com/spendergrsec/statuses/3303390960
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2010/dsa-2005
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2009/08/17/4
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-1672.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/36051
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.ubuntu.com/usn/USN-852-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/0528
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=511143
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=517830
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1540.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1548.html
Source: af854a3a-2127-422b-91ae-364da2661108

74 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.1%
23th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

linux