The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2009-07-16T15:00:00
Updated: 2024-08-07T05:27:54.804Z
Reserved: 2009-06-02T00:00:00
Link: CVE-2009-1895
Vulnrichment
No data.
NVD
Status : Modified
Published: 2009-07-16T15:30:00.703
Modified: 2024-11-21T01:03:38.880
Link: CVE-2009-1895
Redhat