Description
The do_sigaltstack function in kernel/signal.c in Linux kernel 2.4 through 2.4.37 and 2.6 before 2.6.31-rc5, when running on 64-bit systems, does not clear certain padding bytes from a structure, which allows local users to obtain sensitive information from the kernel stack via the sigaltstack function.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1872-1 | New Linux 2.6.18 packages fix several vulnerabilities |
Debian DSA |
DSA-1928-1 | New Linux 2.6.24 packages fix several vulnerabilities |
EUVD |
EUVD-2009-2837 | The do_sigaltstack function in kernel/signal.c in Linux kernel 2.4 through 2.4.37 and 2.6 before 2.6.31-rc5, when running on 64-bit systems, does not clear certain padding bytes from a structure, which allows local users to obtain sensitive information from the kernel stack via the sigaltstack function. |
Ubuntu USN |
USN-852-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T06:07:36.606Z
Reserved: 2009-08-18T00:00:00.000Z
Link: CVE-2009-2847
No data.
Status : Deferred
Published: 2009-08-18T21:00:00.377
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-2847
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN