4.9
CVSSv2

CVE-2009-2847

Published: 18/08/2009 Updated: 07/11/2023
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
VMScore: 495
Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Summary

The do_sigaltstack function in kernel/signal.c in Linux kernel 2.4 up to and including 2.4.37 and 2.6 prior to 2.6.31-rc5, when running on 64-bit systems, does not clear certain padding bytes from a structure, which allows local users to obtain sensitive information from the kernel stack via the sigaltstack function.

Vulnerable Product Search on Vulmon Subscribe to Product

linux kernel 2.6.24.7

linux kernel 2.6.25.15

linux linux_kernel

linux linux_kernel 2.6

linux linux_kernel 2.6.0

linux linux_kernel 2.6.1

linux linux_kernel 2.6.10

linux linux_kernel 2.6.11

linux linux_kernel 2.6.11.1

linux linux_kernel 2.6.11.2

linux linux_kernel 2.6.11.3

linux linux_kernel 2.6.11.4

linux linux_kernel 2.6.11.5

linux linux_kernel 2.6.11.6

linux linux_kernel 2.6.11.7

linux linux_kernel 2.6.11.8

linux linux_kernel 2.6.11.9

linux linux_kernel 2.6.11.10

linux linux_kernel 2.6.11.11

linux linux_kernel 2.6.11.12

linux linux_kernel 2.6.12

linux linux_kernel 2.6.12.1

linux linux_kernel 2.6.12.2

linux linux_kernel 2.6.12.3

linux linux_kernel 2.6.12.4

linux linux_kernel 2.6.12.5

linux linux_kernel 2.6.12.6

linux linux_kernel 2.6.13

linux linux_kernel 2.6.13.1

linux linux_kernel 2.6.13.2

linux linux_kernel 2.6.13.3

linux linux_kernel 2.6.13.4

linux linux_kernel 2.6.13.5

linux linux_kernel 2.6.14

linux linux_kernel 2.6.14.1

linux linux_kernel 2.6.14.2

linux linux_kernel 2.6.14.3

linux linux_kernel 2.6.14.4

linux linux_kernel 2.6.14.5

linux linux_kernel 2.6.14.6

linux linux_kernel 2.6.14.7

linux linux_kernel 2.6.15

linux linux_kernel 2.6.15.1

linux linux_kernel 2.6.15.2

linux linux_kernel 2.6.15.3

linux linux_kernel 2.6.15.4

linux linux_kernel 2.6.15.5

linux linux_kernel 2.6.15.6

linux linux_kernel 2.6.15.7

linux linux_kernel 2.6.16

linux linux_kernel 2.6.16.1

linux linux_kernel 2.6.16.2

linux linux_kernel 2.6.16.3

linux linux_kernel 2.6.16.10

linux linux_kernel 2.6.16.11

linux linux_kernel 2.6.16.12

linux linux_kernel 2.6.16.13

linux linux_kernel 2.6.16.14

linux linux_kernel 2.6.16.15

linux linux_kernel 2.6.16.16

linux linux_kernel 2.6.16.17

linux linux_kernel 2.6.16.18

linux linux_kernel 2.6.16.19

linux linux_kernel 2.6.16.20

linux linux_kernel 2.6.16.21

linux linux_kernel 2.6.16.22

linux linux_kernel 2.6.16.23

linux linux_kernel 2.6.16.24

linux linux_kernel 2.6.16.25

linux linux_kernel 2.6.16.26

linux linux_kernel 2.6.16.27

linux linux_kernel 2.6.16.28

linux linux_kernel 2.6.16.29

linux linux_kernel 2.6.16.30

linux linux_kernel 2.6.16.31

Vendor Advisories

Solar Designer discovered that the z90crypt driver did not correctly check capabilities A local attacker could exploit this to shut down the device, leading to a denial of service Only affected Ubuntu 606 (CVE-2009-1883) ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, sensitive memory leak or privilege escalation The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-2846 Michael Buesch noticed a typing issue in the eisa-eeprom driver for the hppa architecture Lo ...

Exploits

/* * sigaltstack-leakc * * Linux Kernel <= 2631-rc5 sigaltstack 4-Byte Stack Disclosure * Jon Oberheide <jon@oberheideorg> * jonoberheideorg * * Information: * * gitkernelorg/linus/0083fc2c50e6c5127c2802ad323adf8143ab7856 * * Ulrich Drepper correctly points out that there is generally padding in * ...