CVE-2009-2695

Public Exploit

Description

The Linux kernel before 2.6.31-rc7 does not properly prevent mmap operations that target page zero and other low memory addresses, which allows local users to gain privileges by exploiting NULL pointer dereference vulnerabilities, related to (1) the default configuration of the allow_unconfined_mmap_low boolean in SELinux on Red Hat Enterprise Linux (RHEL) 5, (2) an error that causes allow_unconfined_mmap_low to be ignored in the unconfined_t domain, (3) lack of a requirement for the CAP_SYS_RAWIO capability for these mmap operations, and (4) interaction between the mmap_min_addr protection mechanism and certain application programs.

Category

7.2
CVSS
Severity: High
CVSS 2.0 •
EPSS 0.08%
Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory ubuntu.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory debian.org Vendor Advisory secunia.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc7
http://www.redhat.com/support/errata/RHSA-2009-1672.html vendor advisory
http://git.kernel.org/?p=linux/kernel/git/jmorris/security-testing-2.6.git%3Ba=commit%3Bh=84336d1a77ccd2c06a730ddd38e695c2324a7386
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1d9959734a1949ea4f2427bd2d8b21ede6b2441c
http://www.securityfocus.com/bid/36051 patch vdb entry
https://rhn.redhat.com/errata/RHSA-2009-1540.html vendor advisory
https://bugzilla.redhat.com/show_bug.cgi?id=517830
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ab5a91a8364c3d6fc617abc47cc81d162c01d90a
http://www.ubuntu.com/usn/USN-852-1 vendor advisory
http://secunia.com/advisories/38794 third party advisory
http://lists.vmware.com/pipermail/security-announce/2010/000082.html mailing list
http://patchwork.kernel.org/patch/36540/
http://git.kernel.org/?p=linux/kernel/git/jmorris/security-testing-2.6.git%3Ba=commit%3Bh=47d439e9fb8a81a90022cfa785bf1c36c4e2aff6
http://patchwork.kernel.org/patch/36539/
http://kbase.redhat.com/faq/docs/DOC-18042
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=788084aba2ab7348257597496befcbccabdc98a3
http://eparis.livejournal.com/606.html
http://twitter.com/spendergrsec/statuses/3303390960
https://bugzilla.redhat.com/show_bug.cgi?id=511143
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01256.html vendor advisory
http://patchwork.kernel.org/patch/36649/ patch
https://rhn.redhat.com/errata/RHSA-2009-1548.html vendor advisory
http://thread.gmane.org/gmane.linux.kernel.lsm/9075
http://git.kernel.org/?p=linux/kernel/git/jmorris/security-testing-2.6.git%3Ba=commit%3Bh=a2551df7ec568d87793d2eea4ca744e86318f205
http://secunia.com/advisories/38834 third party advisory
http://danwalsh.livejournal.com/30084.html exploit
http://git.kernel.org/?p=linux/kernel/git/jmorris/security-testing-2.6.git%3Ba=commit%3Bh=7c73875e7dda627040b12c19b01db634fa7f0fd1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9882 signature vdb entry
http://patchwork.kernel.org/patch/36650/
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9c0d90103c7e0eb6e638e5b649e9f6d8d9c1b4b3
http://www.openwall.com/lists/oss-security/2009/08/17/4 mailing list
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7144 signature vdb entry
http://secunia.com/advisories/36501 third party advisory vendor advisory
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8cf948e744e0218af604c32edecde10006dc8e9e
http://www.debian.org/security/2010/dsa-2005 vendor advisory
http://secunia.com/advisories/37105 third party advisory
http://www.vupen.com/english/advisories/2010/0528 vdb entry

Frequently Asked Questions

What is the severity of CVE-2009-2695?
CVE-2009-2695 has been scored as a high severity vulnerability.
How to fix CVE-2009-2695?
To fix CVE-2009-2695, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2009-2695 being actively exploited in the wild?
It is possible that CVE-2009-2695 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.