CVE-2009-2691

The mm_for_maps function in fs/proc/base.c in the Linux kernel 2.6.30.4 and earlier allows local users to read (1) maps and (2) smaps files under proc/ via vectors related to ELF loading, a setuid process, and a race condition.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=00f89d218523b9bf6b522349c039d5ac80aa536d
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13f0feafa6b8aead57a2a328e2fca6a5828bf286
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=704b836cbf19e885f8366bccb2e4b0474346c02d
http://lkml.org/lkml/2009/6/23/652
http://lkml.org/lkml/2009/6/23/653 Patch
http://marc.info/?l=linux-kernel&m=124718946021193 Patch
http://marc.info/?l=linux-kernel&m=124718949821250 Patch
http://secunia.com/advisories/36265 Vendor Advisory
http://secunia.com/advisories/36501
http://www.debian.org/security/2010/dsa-2005
http://www.openwall.com/lists/oss-security/2009/08/11/1
http://www.securityfocus.com/bid/36019
http://www.vupen.com/english/advisories/2009/2246 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=516171
https://exchange.xforce.ibmcloud.com/vulnerabilities/52401
https://rhn.redhat.com/errata/RHSA-2009-1540.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01256.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=00f89d218523b9bf6b522349c039d5ac80aa536d
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13f0feafa6b8aead57a2a328e2fca6a5828bf286
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=704b836cbf19e885f8366bccb2e4b0474346c02d
http://lkml.org/lkml/2009/6/23/652
http://lkml.org/lkml/2009/6/23/653 Patch
http://marc.info/?l=linux-kernel&m=124718946021193 Patch
http://marc.info/?l=linux-kernel&m=124718949821250 Patch
http://secunia.com/advisories/36265 Vendor Advisory
http://secunia.com/advisories/36501
http://www.debian.org/security/2010/dsa-2005
http://www.openwall.com/lists/oss-security/2009/08/11/1
http://www.securityfocus.com/bid/36019
http://www.vupen.com/english/advisories/2009/2246 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=516171
https://exchange.xforce.ibmcloud.com/vulnerabilities/52401
https://rhn.redhat.com/errata/RHSA-2009-1540.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01256.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30:rc7-git6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*

History

No history.

Information

Published : 2009-08-14 15:16

Updated : 2025-04-09 00:30


NVD link : CVE-2009-2691

Mitre link : CVE-2009-2691

CVE.ORG link : CVE-2009-2691


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor