#VU91018 NULL pointer dereference in Linux kernel


Published: 2024-06-04

Vulnerability identifier: #VU91018

Vulnerability risk: Low

CVSSv3.1: 7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2009-2767

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: Yes

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to NULL pointer dereference within the no_timer_create() and init_posix_timers() functions in kernel/posix-timers.c. A local user can execute arbitrary code.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=70d715fd0597f18528f389b5ac59102263067744
http://lkml.org/lkml/2009/8/4/28
http://lkml.org/lkml/2009/8/4/40
http://secunia.com/advisories/36200
http://secunia.com/advisories/37105
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc6
http://www.openwall.com/lists/oss-security/2009/08/06/2
http://www.ubuntu.com/usn/USN-852-1
http://www.vupen.com/english/advisories/2009/2197
http://exchange.xforce.ibmcloud.com/vulnerabilities/52317


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability